UN Group: UN-43233200 - Security and protection software
DeviceLock DeviceLock 8.2
Data leaks can be initiated by either unwitting employees or users with malicious intent copying proprietary or sensitive information from their PCs to flash memory sticks, smartphones, cameras, PDA’s, DVD/CDROMs, or other convenient forms of portable storage. Or, leaks may spring from user emails, instant messages, web forms, social network exchanges or telnet sessions. Wireless endpoint interfaces like Wi-Fi, Bluetooth, and Infrared as well as device synchronization channels provide additional avenues for data loss. Likewise, endpoint PCs can be infected with vicious malware that harvest user keystrokes and send the stolen data over SMTP or FTP channels into criminal hands. While these vulnerabilities can evade both network security solutions and native Windows controls, the DeviceLock Endpoint Data Leak Prevention (DLP) Suite addresses them.
DeviceLock Endpoint DLP Suite provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost. Its multi-layered inspection and interception engine provides fine-grained control over a full range of data leakage pathways at the context level. For further confidence that no sensitive data is escaping, content analysis and filtering can be applied to select endpoint data exchanges with removable media and PnP devices, as well as with the network. With DeviceLock, security administrators can precisely match user rights to job function with regard to transferring, receiving and storing data on corporate computers.
DeviceLock supports a straightforward approach to DLP management that allows security administrators to use Microsoft Windows Active Directory Group Policy Objects (GPOs) and DeviceLock consoles for dynamically managing distributed endpoint agents that enforce centrally defined DLP policies on their host computers. With DeviceLock in place, you can centrally control, log, shadow-copy, and analyze end-user access to and data transfers through all types of peripheral devices and ports, as well as network communications on corporate computers.
DeviceLock Discovery A functional component of the DeviceLock DLP Suite, DeviceLock Discovery enables organizations to gain visibility and control over confidential "data at rest" stored across their IT environment in order to proactively prevent data breaches and achieve compliance with regulatory and corporate data security requirements.
By automatically scanning data residing on network shares, storage systems, and endpoint computers inside and outside of the corporate network, DeviceLock Discovery locates documents with exposed sensitive content, provides options to protect them with remediation actions, and can initiate incident management procedures by sending real-time alerts to Security Information and Event Management (SIEM) systems used in the organization.
Additional information:More details (link)
Other info:DeviceLock Discovery
- SSH Client/Server
- Ontrack EasyRecovery
- Recover My Files
- Mount Image Pro
- Evidence Center
- Symantec .Cloud
- MEO File Encryption Software
- Web Vulnerability Scanner
- Amped FIVE
- Stellar Phoenix Data Recovery
- Oxygen Forensic
- Intercept X
- Passive Vulnerability Scanner
- Password Reset Server
- Passware Kit Business
|Order||Item no||Name||Type||Price excl. VAT||Price incl. VAT 24%|
|Order||143565||DeviceLock Base 5-24 User license (price per yeach) with 1Y maint.||License||40,00 €||49,60 €||Order||143561||DeviceLock ContentLock 5-24 User license (price per yeach) with 1Y maint.||License||45,00 €||55,80 €||Order||143569||DeviceLock Endpoint DLP Suite Suite 5-24 User license (price per yeach) with 1Y maint.||License||91,80 €||113,83 €||Order||143573||DeviceLock NetworkLock 5-24 User license (price per yeach) with 1Y maint.||License||23,00 €||28,52 €|
License prices are often shown as a price per user or computer. Moonsoft reserves the right to change pricing without prior notice. The prices indicated are shown with value added tax (usually 24% except for books) and without. To see more information about a product, click the item number in the table above.