DeviceLock 7 review
Provides the perfect panacea for data leakage, adding application controls and greater content awareness
Review Date: 1 Apr 2011
Reviewed By: Dave Mitchell
Price when reviewed: £15 (£18 inc VAT)
Features & Design
Value for Money
Ease of Use
Businesses with stiff perimeter security may think their data is safe, but the number of communication methods and removable storage devices available to users makes data leakage a danger.
We've always been impressed by DeviceLock's solution, and this latest version adds stronger access security at the network protocol level. It also has a greater content awareness, allowing it to apply access policies based on file content as well as file type.
At its foundation, DeviceLock provides controls for managing access to every workstation port and removable storage device. It can control data transfers between the latest iPads and iPhones, and manage access to calendars, contacts and email.
DeviceLock 7 introduces the optional NetworkLock component, which takes access control to the network protocol level. For SMTP, you can control connections to a mail server, sending of emails and permitting attachments.
HTTP policies determine whether you can post content to web forms, upload files to a web server, or whether you're allowed web browser access. For social networking sites you can control basic access, permit comments and messages and allow or deny uploading content.
In our review of DeviceLock 6.4, we looked at the offline security policies and the content-aware feature that allows you to control access for specific file types. ContentLock is an optional extra, enhancing the existing content-aware features with the ability to control access based on keywords and patterns within file contents.
Installation on a Windows Server 2008 R2 64-bit system was easy, although it's time DeviceLock used a single console. Here you have three: the standard MMC console integrates with AD, so access policies can be enforced at the user and group level; a second works with the Windows Group Policy Editor; and the Enterprise Manager console is used to deploy the agent, view the status of devices on workstations, and push policies to specific systems.
Agent deployment to our Windows 7 clients took minutes, and the Enterprise Manager scanned our network and provided a list of systems for selection. A global policy is provided so you can lock down access to specific devices and ports once the agent is installed.
Question about e-mail?
I have a question in the review Dave Mitchell says "we could see e-mails being sent" , my question is using this software can you see the contents of the e-mails sent or just the fact that its an e-mail?
By shebanti on 13 Apr 2011
With DeviceLock's shadowing enabled you can see the subject line and the message content along with attachments and their content.
By DaveMitchell on 13 Apr 2011
- Microsoft expands encryption over NSA spying "threat"
- UK Cloud Awards 2014: nominations now open
- BlackBerry says "we're still alive" as sales hit new low
- Has HP turned a corner?
- Adobe admits it's struggling to notify hack victims
- Microsoft rolls out Office 365 admin app for mobile
- Office 2013 Service Pack 1 to arrive early next year
- Backup the best defence against CryptoLocker
- UK SMBs can now buy ads on Twitter
- How long do hard drives actually last?
- How to remove SkyDrive from the Windows 8.1 Explorer
- Switching from iPhone to Android? Switch off iMessage
- Why is Google pumping more money into Firefox?
- Sky Broadband Shield review
- Samsung Galaxy S4: how to double your battery life
- Motorola Moto G review: first look
- IBM Watson meets Willy Wonka
- Google’s support policies shove users towards Chrome
- Lenovo Yoga Tablet review: first look
- Michael Dell's reasons to be cheerful
- gTLDs: what your business should know about new domain names
- Can Microsoft survive? A look at servers and tools
- Can Microsoft survive? The future of Office
- A real-world guide to business VoIP
- Sack your PA: how to stay on top of your work life
- Power lies with the internet giants, not the governments
- Software subscriptions return us to a life of servitude
- How to get a job in cloud computing
- Are today's tech start-ups simply get-rich-quick schemes?
- Choosing the right tablet for business
- Windows Phone App Studio: an easy way to create your first Windows Phone 8 app
- The end of Windows XP support: what it really means for businesses
- Don't rely on Chrome's password vault
- Using Buffer to manage your social media
- Microsoft needs its own Steve Jobs
- Forget credit cards: hackers want your Facebook account
- Can't get fast enough broadband? Here's what to do
- Leap Motion and the battle against UI stagnation
- How to build a really bad network
- Facebook Graph Search: don't panic
There are dozens of exciting prizes up for grabs on PC Pro Competitions. All our competitions are free to enter. Try your luck.ENTER NOW