Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/21/2010
02:57 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New DeviceLock 7.0 Adds Content Filtering And Network Control

DeviceLock 7.0 will support the Windows 7 native data encryption solution for removable drives

San Ramon, California and Washington, DC June 21, 2010 DeviceLock, Inc., a worldwide leader in endpoint data leak prevention (DLP) software solutions, today announced that it will be showcasing the beta release version of DeviceLock 7.0 at the Gartner Security & Risk Management Summit in Washington D.C., June 21st through 23rd, 2010.

DeviceLock 7.0 is the first of the companys endpoint DLP solutions to incorporate advanced content filtering capabilities and control over network communications. It features two new separately licensed components ¾ContentLock, a content monitoring and filtering module, and NetworkLock, a network communications control module¾fully integrated with DeviceLocks best-in-class, full-coverage port/peripheral device access control functionality. The complete package delivers an unprecedented level of performance among endpoint DLP solutions in its price range. The commercial release of DeviceLock 7.0 is scheduled for the third quarter of this year.

By building the most in-demand content filtering capabilities on top of DeviceLocks context-based access controls, weve made DLP practical for the mainstream corporate market and affordable for organizations of any size and budget, including small and medium-sized businesses, said Ashot Oganesyan, DeviceLock CTO and Founder. The endpoint DLP market has been slow to develop, not because enterprises dont understand the need to better control the flow of sensitive data, but because they perceive DLP as overly expensive and complicated.

While some early adopters of content analysis technology have gone from zero to seemingly comprehensive coverage of potential channels of leakage, this has involved huge upfront investment and great reported frustration with the complexity of DLP deployment and maintenance. DeviceLock 7.0 offers a more gradual path off the DLP sidelines by moving up from port and device control to a progression from necessary to enhanced content-aware controls over the data that users transfer from and to corporate endpoint computers, Oganesyan continued.

Recognizing more than 80 file formats and data types, ContentLock extracts and filters the content of data copied to removable drives and plug-n-play storage devices, as well as all printing operations and data that are transmitted over other input/output channels on endpoint computers. NetworkLock adds port-independent network protocol and application detection and filtering, message and session reconstruction with file, data, and parameter extraction, as well as event logging and data shadowing.

By integrating ContentLock and NetworkLock capabilities, DeviceLock 7.0 supports content monitoring and filtering for the most popular network protocols and applications:

- Plain and SSL-protected SMTP email communications with messages and attachments controlled separately;

- Web access and other HTTP-based applications including content inspection of encrypted HTTPS sessions specifically, web mail and social networking applications like Gmail, Yahoo! Mail, Windows Live Mail, Facebook, Twitter, LiveJournal, LinkedIn, MySpace, Odnoklassniki, and Vkontakte;

- Instant Messengers including ICQ/AOL, MSN Messenger, Jabber, IRC, Yahoo! Messenger, Mail.ru Agent;

- File transfers over FTP and FTP-SSL protocols;

- Telnet sessions.

-

In the same effective way that DeviceLock currently integrates with TrueCrypt, PGP, and other removable device encryption products, DeviceLock 7.0 will support the Windows 7 native data encryption solution for removable drives BitLocker To Go. DeviceLock customers can use Microsoft-backed data encryption technology with DeviceLock on their Windows 7 endpoints at no additional cost. As BitLocker To Go can be centrally managed via Microsoft Active Directory like DeviceLock, their combination delivers to customers all the capabilities of endpoint DLP with built-in removable media encryption, while offering both functional advantages and significant cost savings.

Content filtering brings new efficiency and scalability to DeviceLocks data shadowing function across endpoint data channels that include removable and PnP storage devices, network communications, local synchronizations with smartphones, and document printing. Now customers can filter recorded data streams down to just those pieces of information meaningful to security auditing, incident investigations and forensic analysis before saving in the shadow log. This tremendously reduces storage space and network bandwidth requirements for shadow log collection back to the central database.

DeviceLock 7.0 is designed to seamlessly scale from small to large installations and ease DLP deployment and management. Customers can enhance their endpoint data security with content-aware and network control capabilities through the same well-proven MMC-style management interface instantly familiar to Windows security administrators. Most new users can learn and configure DeviceLock for the enterprise in just a few days. With DeviceLock Group Policy Manager, a custom-made MMC snap-in for Windows Group Policy Object Editors, DeviceLock agents can be deployed, fully managed and maintained across the organization from within an existing Active Directory domain. Yet the agents run transparently and do not require user involvement in administrative procedures.

DeviceLock 7.0 DLP Suite components will be priced on a modular basis. DeviceLocks leading local port and peripheral device access control component along with BitLocker To Go integration can still be purchased independently. Customers interested in the ContentLock and NetworkLock add-on components will be able to deploy their DLP functionality incrementally as security requirements demand and budgets allow.

About DeviceLock, Inc.

Since its inception in 1996 as SmartLine, DeviceLock, Inc. has been providing endpoint device control and data leak prevention software solutions to businesses of all sizes and industries. Protecting more than 4 million computers in more than 60,000 organizations worldwide, DeviceLock has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. DeviceLock, Inc. is an international organization with offices in San Ramon (California, US), London (UK), Ratingen (Germany), Moscow (Russia) and Milan (Italy).

COPYRIGHT 2010 DeviceLock, Inc. All rights reserved. DeviceLock' and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. For more information, visit DeviceLock web-site at www.devicelock.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
More SolarWinds Attack Details Emerge
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/12/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).