Review: DeviceLock Endpoint DLP Suite

By
Follow google news

Performs well with regard to restricting access and protecting data transfer to endpoint devices, but the MMC-based admin user interface isn’t flashy, but it works.

DeviceLock Endpoint DLP is a data and device protection solution which controls access to local Windows devices and watches input/output channels for sensitive data flow. The solution integrates with Active Directory and is managed by a Microsoft Management Console (MMC) snap-in. Both the endpoint agents and the server integration are installed on common Windows platforms, and Microsoft SQL Server is used as the repository.

Deploying the product is quick and easy. Administrators familiar with Windows-based MMC consoles will appreciate the integration, as all administrative tasks are organized in the familiar MMC display. The user interface isn't flashy or the most polished we've seen, but all the common tasks designed for this solution are easy to navigate.

The product overall serves two purposes: to control local access on the endpoints to ports and devices, and to watch for sensitive data flow through regular expressions and pattern matching. Together these two core principles serve as a device and data leakage layer of protection. The console has templates for the most common devices, and policies are deployed using inherited Group Policy Objects based on how the admin wants to control user access to removable media, CD/DVD drives, network adapters and more.

Although the documentation was acceptable in most categories, some of the content felt outdated. Standard support is bundled into the purchase and includes 24/7 web and email help. Phone support is only available nine-hours-a-day/five-days-a-week in the United States. However, there are plans to integrate 24/7 phone support later in 2011.

Review: DeviceLock Endpoint DLP Suite

For organisations looking for device control and DLP, the per seat price point is a good value.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Australia's critical infrastructure security laws "toothless"

Australia's critical infrastructure security laws "toothless"

"CanisterWorm" supply chain malware attacks npm

"CanisterWorm" supply chain malware attacks npm

Gov proposes disclosure delay for most serious cyberattacks

Gov proposes disclosure delay for most serious cyberattacks

US regulator bans imports of new foreign-made routers

US regulator bans imports of new foreign-made routers

Log In

  |  Forgot your password?