DeviceLock 7 review
Provides the perfect panacea for data leakage, adding application controls and greater content awareness
Review Date: 1 Apr 2011
Reviewed By: Dave Mitchell
Price when reviewed: £15 (£18 inc VAT)
Features & Design
Value for Money
Ease of Use
Businesses with stiff perimeter security may think their data is safe, but the number of communication methods and removable storage devices available to users makes data leakage a danger.
We've always been impressed by DeviceLock's solution, and this latest version adds stronger access security at the network protocol level. It also has a greater content awareness, allowing it to apply access policies based on file content as well as file type.
At its foundation, DeviceLock provides controls for managing access to every workstation port and removable storage device. It can control data transfers between the latest iPads and iPhones, and manage access to calendars, contacts and email.
DeviceLock 7 introduces the optional NetworkLock component, which takes access control to the network protocol level. For SMTP, you can control connections to a mail server, sending of emails and permitting attachments.
HTTP policies determine whether you can post content to web forms, upload files to a web server, or whether you're allowed web browser access. For social networking sites you can control basic access, permit comments and messages and allow or deny uploading content.
In our review of DeviceLock 6.4, we looked at the offline security policies and the content-aware feature that allows you to control access for specific file types. ContentLock is an optional extra, enhancing the existing content-aware features with the ability to control access based on keywords and patterns within file contents.
Installation on a Windows Server 2008 R2 64-bit system was easy, although it's time DeviceLock used a single console. Here you have three: the standard MMC console integrates with AD, so access policies can be enforced at the user and group level; a second works with the Windows Group Policy Editor; and the Enterprise Manager console is used to deploy the agent, view the status of devices on workstations, and push policies to specific systems.
Agent deployment to our Windows 7 clients took minutes, and the Enterprise Manager scanned our network and provided a list of systems for selection. A global policy is provided so you can lock down access to specific devices and ports once the agent is installed.
Question about e-mail?
I have a question in the review Dave Mitchell says "we could see e-mails being sent" , my question is using this software can you see the contents of the e-mails sent or just the fact that its an e-mail?
By shebanti on 13 Apr 2011
With DeviceLock's shadowing enabled you can see the subject line and the message content along with attachments and their content.
By DaveMitchell on 13 Apr 2011
- Dell profits slide 79% amid buyout talks
- Forget cloud subscriptions: users prefer standard licences
- McAfee: cloud storage could help spread viruses
- Analysts question Windows 8 as UK PC shipments slump
- Google pools storage across Gmail and Drive
- Ofcom accused of killing off VoIP competition
- ShoreTel dock turns iPhones and iPads into desk phones
- Bill Gates says iPad users "frustrated"
- Intel Silvermont promises three-fold boost for tablets
- Customers fume as BT introduces IP sharing
- Hands on with the new Google Maps
- Nokia Lumia 925 review: first look
- Why I won't subscribe to Creative Cloud
- GoPro camera strapped to a remote-control helicopter: the ultimate boy's toy
- Acer Iconia A1 review: first look
- Acer Aspire P3 review: first look
- Acer Aspire R7 review: first look
- How we produce the PC Pro podcast
- Google Now draining iPhone battery
- The government website that doesn't work with IE, Chrome, Firefox, Safari, Macs or smartphones
- How to get a job in cloud computing
- Are today's tech start-ups simply get-rich-quick schemes?
- Choosing the right tablet for business
- Best free antivirus for 2013
- The best business broadband: how to choose the right package
- Choosing your web hosting package: space, bandwidth, service-level agreements and email handling
- Windows Server 2012 features in-depth
- How to protect your business against spear phishing
- How to install virtual servers with Hyper-V
- Implementing virtualisation through Hyper-V
- How to boost your mobile reception
- How to fix Facebook: Social Fixer
- Taking the stress out of WordPress updates
- Where to download free web fonts
- Turn your tablet into a Sky+ remote control
- How to measure the success of a new IT system
- Three years on: the state of the tablet market
- Windows 8: what works and what doesn't
- Yes, I write down my passwords
- How to make money from apps
There are dozens of exciting prizes up for grabs on PC Pro Competitions. All our competitions are free to enter. Try your luck.ENTER NOW