DeviceLock Endpoint DLP Suite

Powered by SC Magazine
 

Performs well with regard to restricting access and protecting data transfer to endpoint devices, but the MMC-based admin user interface isn’t flashy, but it works.

DeviceLock Endpoint DLP is a data and device protection solution which controls access to local Windows devices and watches input/output channels for sensitive data flow. The solution integrates with Active Directory and is managed by a Microsoft Management Console (MMC) snap-in. Both the endpoint agents and the server integration are installed on common Windows platforms, and Microsoft SQL Server is used as the repository.

Deploying the product is quick and easy. Administrators familiar with Windows-based MMC consoles will appreciate the integration, as all administrative tasks are organized in the familiar MMC display. The user interface isn't flashy or the most polished we've seen, but all the common tasks designed for this solution are easy to navigate.

The product overall serves two purposes: to control local access on the endpoints to ports and devices, and to watch for sensitive data flow through regular expressions and pattern matching. Together these two core principles serve as a device and data leakage layer of protection. The console has templates for the most common devices, and policies are deployed using inherited Group Policy Objects based on how the admin wants to control user access to removable media, CD/DVD drives, network adapters and more.

Although the documentation was acceptable in most categories, some of the content felt outdated. Standard support is bundled into the purchase and includes 24/7 web and email help. Phone support is only available nine-hours-a-day/five-days-a-week in the United States. However, there are plans to integrate 24/7 phone support later in 2011.

Copyright © SC Magazine, US edition


DeviceLock Endpoint DLP Suite
 
Overall Rating
Verdict:
For organisations looking for device control and DLP, the per seat price point is a good value.
Product Info
Specs:
Version 7
 
Supplier:
 
Price when reviewed:
30
 
 
 
Top Stories
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1009

Vote