Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Windows 7 endpoint protection

DeviceLock : 22 October, 2009  (New Product)
Context aware data loss prevention features in DeviceLock 6.4.1 for endpoint protection in Windows 7 environments
DeviceLock announces support for Microsoft's Windows 7 operating system. Delivering a full set of context-aware data leak prevention capabilities, DeviceLock version 6.4.1 can be installed on all new Windows 7 desktops, laptops and servers for immediate protection from insider-originated data breaches.

"With Windows 7 so highly anticipated, we recognise that many customers will want to waste no time in migrating to the new platform. So we pulled out all the stops to build Windows 7 support into DeviceLock before the operating system launch," said Ashot Oganesyan, DeviceLock CTO and Founder. "This underscores our commitment to providing best-in-class endpoint DLP software and to supporting our customers' efforts to comply with stringent legislation and industry standards regarding protection of their corporate and customer data."

DeviceLock far exceeds the device control features available in Windows 7, enabling customers to precisely control, log, shadow-copy and audit end-user access to all types of local ports and peripheral devices on corporate endpoint computers. These include USB, FireWire, LPT, COM, IrDA, Removable, HDD, Floppy, DVD/CD-ROM, Tape, Modem, Bluetooth, Wi-Fi, etc.

Featuring a patent-pending local synchronisation filtering technology, DeviceLock gives security administrators the ability to centrally and granularly control which types of data specified users or their groups are allowed to synchronise between corporate computers and locally connected mobile devices including Windows Mobile, Palm and iPhone smartphones. DeviceLock 6.4.1 also adds phase-one BlackBerry device type support that includes device presence detection, access controls and event logging. For Windows ActiveSync, Windows Mobile Device Centre, HotSync and iTunes protocols, DeviceLock can recognise and filter numerous data object types, allowing administrators to selectively allow or block the synchronisation of files, emails, email attachments and accounts, contacts, tasks, notes, calendar items, bookmarks, and various media types. Time-based or schedule-based policies as well as data flow directional control can also be enforced for local synchronisations to allow corporate security policies to be more flexible, precise and dynamic.

Protecting organisations from uncontrolled printing activities at corporate endpoints, DeviceLock puts local and network printing under the strict control of IT security administration. By intercepting, filtering and tracing print spooler operations, DeviceLock enables centralised specification and local enforcement of user access privileges to any local, network, or virtual printers regardless of how they are connected to the computer, including any non-USB connections.

Complementing its port, device, and data channel-based controls with data type-level security, DeviceLock supports true file type detection and filtering. This function works by intercepting any file system's read/write operations with peripheral devices, performing real-time analysis of the entire binary content of transmitted data, and enforcing applicable file-type-based security policies.

DeviceLock also integrates with leading encryption products from PGP, Lexar, SecurStar, and TrueCrypt in order to protect data exported to removable storage devices. In addition, DeviceLock blocks operations of USB and PS/2 hardware keyloggers.

DeviceLock provides scalable, centralized, and easy-to-learn management and administration via a customised Microsoft Management Console (MMC) snap-in that natively integrates with Group Policy Object Editor in Microsoft Active Directory. DeviceLock agents can be deployed, managed and administered completely from within an existing Microsoft Active Directory domain. A separate component, the DeviceLock Enterprise Server (DLES), is available for centrally auto-collecting audit and shadow data from managed endpoints. Highly-granular event logging and data shadowing configurations are supported for tracking and analysing user actions on peripheral ports/devices, related system events and data transferred to peripheral devices. In addition, DLES can monitor remote DeviceLock-managed computers in real-time to check on agent status and policy template consistency.

New in DeviceLock 6.4.1 is an optional add-on component for full-text search in the central shadowing and event log database - DeviceLock Search Server (DLSS). DLSS is aimed at making the labor-intensive processes of information security compliance auditing, incident investigations, and forensic analysis more precise, convenient and time-efficient.

DeviceLock's comprehensive mix of configurable policy parameters and options facilitates the definition and enforcement of a "least privilege" corporate IT security policy. With DeviceLock, IT security administrators are equipped to logically profile the business role of every employee, group or department with regard to their use of local PC ports and peripheral devices, keeping each to the minimal set of operations required to perform their role. This reduces the overall risk of data leaks and helps organizations to better comply with applicable IT security regulations and industry standards.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo