DeviceLock 7 review
Provides the perfect panacea for data leakage, adding application controls and greater content awareness
Review Date: 1 Apr 2011
Reviewed By: Dave Mitchell
Price when reviewed: £15 (£18 inc VAT)
Features & Design
Value for Money
Ease of Use
Businesses with stiff perimeter security may think their data is safe, but the number of communication methods and removable storage devices available to users makes data leakage a danger.
We've always been impressed by DeviceLock's solution, and this latest version adds stronger access security at the network protocol level. It also has a greater content awareness, allowing it to apply access policies based on file content as well as file type.
At its foundation, DeviceLock provides controls for managing access to every workstation port and removable storage device. It can control data transfers between the latest iPads and iPhones, and manage access to calendars, contacts and email.
DeviceLock 7 introduces the optional NetworkLock component, which takes access control to the network protocol level. For SMTP, you can control connections to a mail server, sending of emails and permitting attachments.
HTTP policies determine whether you can post content to web forms, upload files to a web server, or whether you're allowed web browser access. For social networking sites you can control basic access, permit comments and messages and allow or deny uploading content.
In our review of DeviceLock 6.4, we looked at the offline security policies and the content-aware feature that allows you to control access for specific file types. ContentLock is an optional extra, enhancing the existing content-aware features with the ability to control access based on keywords and patterns within file contents.
Installation on a Windows Server 2008 R2 64-bit system was easy, although it's time DeviceLock used a single console. Here you have three: the standard MMC console integrates with AD, so access policies can be enforced at the user and group level; a second works with the Windows Group Policy Editor; and the Enterprise Manager console is used to deploy the agent, view the status of devices on workstations, and push policies to specific systems.
Agent deployment to our Windows 7 clients took minutes, and the Enterprise Manager scanned our network and provided a list of systems for selection. A global policy is provided so you can lock down access to specific devices and ports once the agent is installed.
Question about e-mail?
I have a question in the review Dave Mitchell says "we could see e-mails being sent" , my question is using this software can you see the contents of the e-mails sent or just the fact that its an e-mail?
By shebanti on 13 Apr 2011
With DeviceLock's shadowing enabled you can see the subject line and the message content along with attachments and their content.
By DaveMitchell on 13 Apr 2011
- Microsoft ordered to hand over European data
- Will the next Windows 8.1 update arrive next month?
- BT One Phone lets SMBs ditch landlines for mobiles
- Microsoft shows Modern apps running in desktop windows
- Apple and IBM buddy up for enterprise push
- Windows Phone 8.1 starts rolling out to Nokia phones
- Government broadband plans "lack ambition"
- SMBs get Office 365 price cuts, new plans
- Windows 7: you can keep it until 2020
- BlackBerry Passport's square for spreadsheets
- How Google Glass ruined my lunch hour
- Smartphone battery packs: can a USB power pack beat the festival battery blues?
- Windows Easy Transfer – not so "easy" in Windows 8.1
- Formula 1: what a difference virtualisation makes
- Office of the future: comfy chairs and tablets everywhere
- I went to Glastonbury and the only thing that got high was my smartphone
- Meet the robots helping teach children
- PaperLater: would you pay to print the internet?
- Amazon vs Kobo: how much to make the ebook switch?
- Phishing emails: how I nearly got caught out
- Five worst SMB security threats... and how to solve them
- Doing business in a social era
- How to configure SysLookup for your network
- The 18 best Outlook tips for increasing productivity: become an Outlook expert with these lesser-known tips
- Office: should you buy it, rent it - or dump it?
- Small server vs cloud: which is best for SMBs?
- The best mobile apps for business
- Windows XP: Microsoft’s ticking time bomb
- gTLDs: what your business should know about new domain names
- Can Microsoft survive? A look at servers and tools
- Top five VoIP mistakes
- How to add in-app purchasing to an iPhone, Android or Windows app
- Remote-control ransomware: TeamViewer and software hardball
- Why laptops with serial ports matter to the Internet of Things
- Make your mobile battery last longer
- Small steps into handling Big Data
- Nexus 5: does it really run stock Android?
- How to get broadband to a garden office
- How to write your company's IT security policy
- Raspberry Pi and Wolfram: a must-have for every child