Toplam `1´ adet sonuçtan, sayfa başına `1 ile 1´ arası kadar sonuç gösteriliyor!
04.09.11, 11:43 #1
- Üyelik Tarihi
- Dec 2010
- 42 Paylaşımında, 834 Beğeni aldı!
DeviceLock 7.0 Build 29555
DeviceLock is a policy-based endpoint data leak prevention (DLP) security solution that enables network administrators to centrally control uploading and downloading activity through local computer devices and network protocols and applications. With DeviceLock you can lock out unauthorized users from USB and FireWire devices, WiFi and Bluetooth adapters, CD-Rom and floppy drives, infrared, serial and parallel ports, local and network printers, PDAs, smartphones and many other plug-and-play devices. Also, DeviceLock contains port-independent network protocol and application detection and filtering, message and session reconstruction with file, data, and parameter extraction, as well as event logging and data shadowing.
Featuring a comprehensive central management platform fully integrated with Microsoft Active Directory and Group Policy, DeviceLock enables security administrators to precisely control, shadow-copy, log, and analyze end-user access to all types of devices and local ports on their Windows computers, as well as automatically disrupting operations of any hardware keyloggers. DeviceLock proactively protects against data leakage and malware infiltration via the local ports of distributed computers, thus significantly reducing business risks and costs associated with malicious actions, errors, or negligence by insiders or others with physical computer access.
Please read this file carefully (especially the "Installation" chapter) before installing the program to your computer.
IMPORTANT! If you obtained DeviceLock not from our web page, but from another source (CD or a software library), please visit our home page where you might find a later version.
Copyright and license
7.0 Build 29555
Windows NT 4.0, Windows 2000, Windows XP, Windows Server 2003, Windows Vista,
Windows Server 2008, Windows 7
DeviceLock is a policy-based endpoint data leak prevention security solution.
See "install.txt" file.
See "register.txt" file.
Copyright and license
See "license.txt" file.
See "contacts.txt" file.
Konu Sahibi GökhaN√ Forum Kırık Linkli Konular DeposuCevap: 1Son Mesaj : 06.10.14, 17:43