DeviceLock is a policy-based endpoint data leak prevention (DLP) security solution that enables network administrators to centrally control uploading and downloading activity through local computer devices and network protocols and applications. With DeviceLock you can lock out unauthorized users from USB and FireWire devices, WiFi and Bluetooth adapters, CD-Rom and floppy drives, infrared, serial and parallel ports, local and network printers, PDAs, smartphones and many other plug-and-play devices. Also, DeviceLock contains port-independent network protocol and application detection and filtering, message and session reconstruction with file, data, and parameter extraction, as well as event logging and data shadowing.
Featuring a comprehensive central management platform fully integrated with Microsoft Active Directory and Group Policy, DeviceLock enables security administrators to precisely control, shadow-copy, log, and analyze end-user access to all types of devices and local ports on their Windows computers, as well as automatically disrupting operations of any hardware keyloggers. DeviceLock proactively protects against data leakage and malware infiltration via the local ports of distributed computers, thus significantly reducing business risks and costs associated with malicious actions, errors, or negligence by insiders or others with physical computer access.
DeviceLock: readme
Please read this file carefully (especially the "Installation" chapter) before installing the program to your computer.
IMPORTANT! If you obtained DeviceLock not from our web page, but from another source (CD or a software library), please visit our home page where you might find a later version.
Program information
Company information
Installation (!)
Copyright and license
Technical support
Program information
Program Name:
Program Version:
7.0 Build 29555
Target OS:
Windows NT 4.0, Windows 2000, Windows XP, Windows Server 2003, Windows Vista,
Windows Server 2008, Windows 7
32-bit, 64-bit
Program Description:
DeviceLock is a policy-based endpoint data leak prevention security solution.
See "install.txt" file.
See "register.txt" file.
Copyright and license
See "license.txt" file.
Technical support
See "contacts.txt" file.