Downloads :
  Total: 269  |  Last 7 days: 10
  Product Version :
  Producer :
  Product type :
  Demo  |  Price : 42 $
  Size :
  55.66 MB
  Date added :
  February 2, 2011, 21:55
  Newest Version :

DeviceLock Informations

Publisher's Description:

From DeviceLock, Inc.

You will gain control over access to devices on a local system.

Firewalls and antivirus software are no defense against acts of data theft and corruption from within your organization at local endpoints. You don't have to be an administrator to connect a small digital camera, MP3 player, or flash memory stick to the USB and begin uploading or downloading whatever you want. If you are a system administrator, you know you can't manage such device-level activity via Group Policy.

Using endpoint device security solution called DeviceLock®, network administrators can lock out unauthorized users from USB and FireWire devices, WiFi and Bluetooth adapters, CD-Rom and floppy drives, serial and parallel ports, PDAs and smartphones, local and network printers and many other plug-and-play devices. Once DeviceLock is installed, administrators can control access to any device, depending on the time of day and day of the week.

For enterprises standardized on software and hardware-based encryption solutions like PGP® Whole Disk Encryption, TrueCrypt and Lexar® SAFE PSD S1100 USB drives, DeviceLock allows administrators to centrally define and remotely control the encryption policies their employees must follow when using removable devices for storing and retrieving corporate data. For example, certain employees or their groups can be allowed to write to and read from only specifically encrypted USB flash drives, while other users of the corporate network can be permitted to "read only" from non-encrypted removable storage devices but not write to them.

The USB white list allows you to authorize only specific devices that will not be locked regardless of any other settings. The intention is to allow special devices (e.g. smart card readers) but lock all other devices. Media White List feature allows you to authorize access to specific DVD/CD-ROM disks, uniquely identified by data signature, even when DeviceLock® has otherwise blocked the DVD/CD-ROM drive. A convenience when DVD/CD-ROM disks are routinely used for the distribution of new software or instruction manuals, Media White Listing can also specify allowed users and groups, so that only authorized users are able to access the contents of the DVD or CD-ROM.

The DeviceLock®'s optional data shadowing capability significantly enhances the corporate IT auditors ability to ensure that sensitive information has not left the premises on removable media. It captures full copies of files that are copied to authorized removable devices, Windows Mobile and Palm OS-based PDAs and smartphones, burned to CD/DVD or even printed by authorized end users. Shadow copies are stored on a centralized component of an existing server and any existing ODBC-compliant SQL infrastructure of the customers choosing.

DeviceLock® Enterprise Server can monitor remote computers in real-time, checking DeviceLock® Service status (running or not), policy consistency and integrity. The detailed information is written to


* Added new optional component - DeviceLock Content Security Server (DLCSS). DLCSS includes DeviceLock Search Server which enables you to instantly search text across shadowed files and other logs stored on DeviceLock Enterprise Server.
* Added granular access control, auditing and shadowing for iPhone and iPod Touch devices. Now you can set permissions for different objects (media, contacts, files, etc.) transferring to/from iPhone/iPod. Also, you can enable auditing and shadowing for objects copying from the PCs to iPhones/iPods.
* Added access control and auditing for BlackBerry devices. Now you can control who can connect a BlackBerry device to a local computer and when they can do it. Also, you can audit any user activity involving the BlackBerry device type.
* Added integration with Lexar JumpDrive SAFE S3000 encrypted flash drives. DeviceLock detects Lexar JumpDrive SAFE S3000 drives and applies special "encrypted" permissions to them.
* Added integration with DriveCrypt. DeviceLock detects encrypted DriveCrypt disks (USB Flash Drives and other removable media) and applies special "encrypted" permissions to them. Using these "encrypted" permissions you can, for example, allow writing only to encrypted removable devices and deny writing to unencrypted media.
* Added optional protection against anti-rootkit techniques that could be used to disable DeviceLock Service. When "Enable Unhook Protection" is checked on the "DeviceLock Administrators" dialog, the DeviceLock Driver controls the integrity of its code. If a violation is found, DeviceLock causes Windows to stop with a fatal error.
* Added support for the TrueCrypt's "File-hosted (container)" volume type.
* Added support for Microsoft Windows 7.



Previous Versions for DeviceLock

Software Versions

  Date added
  Jun 22, 2009
  54.55 MB

Latest User Access

VyprVPN for Windows 2.9.5 icon

VyprVPN for Windows 2.9.5

The VyprVPN for Windows application automatically configures
October 2, 2016, 12:26 | Size: 4.71 MB
ZDelete Internet Eraser 7.1.15 icon

ZDelete Internet Eraser 7.1.15

Protect your privacy by preventing undesirable people to access
September 27, 2016, 13:24 | Size: 15.76 MB
BotFence 2.15.0002 icon

BotFence 2.15.0002

BotFence software product pages - information, download, support
September 15, 2016, 15:37 | Size: 5.35 MB
Tipard Windows Password Reset 1.0.6 icon

Tipard Windows Password Reset 1.0.6

Reset or change Windows local/domain admin on all Windows systems
February 6, 2016, 03:11 | Size: 33.04 MB
Secure Folder 8.0.5 icon

Secure Folder 8.0.5

Folder security software that lets you hide, lock and encrypt
October 26, 2015, 23:27 | Size: 1.25 MB
USB Vault 1.8 icon

USB Vault 1.8

Safeguard data by creating a private vault, password-protected
October 26, 2015, 23:24 | Size: 215.04 K
Protected Folder 1.2 icon

Protected Folder 1.2

Password-protect your folders and files from being seen, read
January 6, 2015, 01:22 | Size: 3.4 MB
Usb Voyager 1.00 icon

Usb Voyager 1.00

USB Flash Drive encryption software.
October 2, 2013, 05:58 | Size: 8.69 MB
All In One Keylogger 3.7 icon

All In One Keylogger 3.7

Invisibly records every activity - web, chats, e-mails, screenshots,
July 8, 2013, 01:02 | Size: 4.12 MB
Tracks Eraser Pro 8.9 icon

Tracks Eraser Pro 8.9

Maintain and increase your privacy by cleaning your tracks of
May 30, 2013, 04:31 | Size: 2.29 MB

Last Week
User Access
Best Downloads

Child Control icon

Child Control

This is a parental control tool, to restrict computer, control
Folder Lock icon

Folder Lock

Lock or encrypt files and folders by password protection.
Wipe icon


Clear the user browsing history and all unwanted tracks!
WinPatrol icon


Application that replaces multiple system utilities with its
Deskman icon


Advanced desktop security tool for administrators and users.
GSA AV Guard icon

GSA AV Guard

Audio and/or video monitoring with alert status over phone or
WinLock icon


Comprehensive security solution.
All In One Keylogger icon

All In One Keylogger

Invisibly records every activity - web, chats, e-mails, screenshots,
Chris PC-Lock icon

Chris PC-Lock

Enjoy your time without worrying that somebody unauthorized will
Screen Anytime icon

Screen Anytime

Record anyone windows session to observe it and replay it at
Contact | Privacy Policy
Copyright © 2008 - 2016 - All rights reserved. logo