Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:57 PM
Dark Reading
Dark Reading
Products and Releases

New DeviceLock 7.0 Adds Content Filtering And Network Control

DeviceLock 7.0 will support the Windows 7 native data encryption solution for removable drives

San Ramon, California and Washington, DC June 21, 2010 DeviceLock, Inc., a worldwide leader in endpoint data leak prevention (DLP) software solutions, today announced that it will be showcasing the beta release version of DeviceLock 7.0 at the Gartner Security & Risk Management Summit in Washington D.C., June 21st through 23rd, 2010.

DeviceLock 7.0 is the first of the companys endpoint DLP solutions to incorporate advanced content filtering capabilities and control over network communications. It features two new separately licensed components ¾ContentLock, a content monitoring and filtering module, and NetworkLock, a network communications control module¾fully integrated with DeviceLocks best-in-class, full-coverage port/peripheral device access control functionality. The complete package delivers an unprecedented level of performance among endpoint DLP solutions in its price range. The commercial release of DeviceLock 7.0 is scheduled for the third quarter of this year.

By building the most in-demand content filtering capabilities on top of DeviceLocks context-based access controls, weve made DLP practical for the mainstream corporate market and affordable for organizations of any size and budget, including small and medium-sized businesses, said Ashot Oganesyan, DeviceLock CTO and Founder. The endpoint DLP market has been slow to develop, not because enterprises dont understand the need to better control the flow of sensitive data, but because they perceive DLP as overly expensive and complicated.

While some early adopters of content analysis technology have gone from zero to seemingly comprehensive coverage of potential channels of leakage, this has involved huge upfront investment and great reported frustration with the complexity of DLP deployment and maintenance. DeviceLock 7.0 offers a more gradual path off the DLP sidelines by moving up from port and device control to a progression from necessary to enhanced content-aware controls over the data that users transfer from and to corporate endpoint computers, Oganesyan continued.

Recognizing more than 80 file formats and data types, ContentLock extracts and filters the content of data copied to removable drives and plug-n-play storage devices, as well as all printing operations and data that are transmitted over other input/output channels on endpoint computers. NetworkLock adds port-independent network protocol and application detection and filtering, message and session reconstruction with file, data, and parameter extraction, as well as event logging and data shadowing.

By integrating ContentLock and NetworkLock capabilities, DeviceLock 7.0 supports content monitoring and filtering for the most popular network protocols and applications:

- Plain and SSL-protected SMTP email communications with messages and attachments controlled separately;

- Web access and other HTTP-based applications including content inspection of encrypted HTTPS sessions specifically, web mail and social networking applications like Gmail, Yahoo! Mail, Windows Live Mail, Facebook, Twitter, LiveJournal, LinkedIn, MySpace, Odnoklassniki, and Vkontakte;

- Instant Messengers including ICQ/AOL, MSN Messenger, Jabber, IRC, Yahoo! Messenger, Mail.ru Agent;

- File transfers over FTP and FTP-SSL protocols;

- Telnet sessions.


In the same effective way that DeviceLock currently integrates with TrueCrypt, PGP, and other removable device encryption products, DeviceLock 7.0 will support the Windows 7 native data encryption solution for removable drives BitLocker To Go. DeviceLock customers can use Microsoft-backed data encryption technology with DeviceLock on their Windows 7 endpoints at no additional cost. As BitLocker To Go can be centrally managed via Microsoft Active Directory like DeviceLock, their combination delivers to customers all the capabilities of endpoint DLP with built-in removable media encryption, while offering both functional advantages and significant cost savings.

Content filtering brings new efficiency and scalability to DeviceLocks data shadowing function across endpoint data channels that include removable and PnP storage devices, network communications, local synchronizations with smartphones, and document printing. Now customers can filter recorded data streams down to just those pieces of information meaningful to security auditing, incident investigations and forensic analysis before saving in the shadow log. This tremendously reduces storage space and network bandwidth requirements for shadow log collection back to the central database.

DeviceLock 7.0 is designed to seamlessly scale from small to large installations and ease DLP deployment and management. Customers can enhance their endpoint data security with content-aware and network control capabilities through the same well-proven MMC-style management interface instantly familiar to Windows security administrators. Most new users can learn and configure DeviceLock for the enterprise in just a few days. With DeviceLock Group Policy Manager, a custom-made MMC snap-in for Windows Group Policy Object Editors, DeviceLock agents can be deployed, fully managed and maintained across the organization from within an existing Active Directory domain. Yet the agents run transparently and do not require user involvement in administrative procedures.

DeviceLock 7.0 DLP Suite components will be priced on a modular basis. DeviceLocks leading local port and peripheral device access control component along with BitLocker To Go integration can still be purchased independently. Customers interested in the ContentLock and NetworkLock add-on components will be able to deploy their DLP functionality incrementally as security requirements demand and budgets allow.

About DeviceLock, Inc.

Since its inception in 1996 as SmartLine, DeviceLock, Inc. has been providing endpoint device control and data leak prevention software solutions to businesses of all sizes and industries. Protecting more than 4 million computers in more than 60,000 organizations worldwide, DeviceLock has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. DeviceLock, Inc. is an international organization with offices in San Ramon (California, US), London (UK), Ratingen (Germany), Moscow (Russia) and Milan (Italy).

COPYRIGHT 2010 DeviceLock, Inc. All rights reserved. DeviceLock' and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. For more information, visit DeviceLock web-site at www.devicelock.com.

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-06
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service sc...
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.