You are on United States + Canada website. Select another region to view location-specific content
United States
English
Select another region
Choose region and language
Americas
  • BrasilPortuguês
  • CanadaEnglish
  • CanadaFrançais
  • LATAMEspañol
  • United StatesEnglish
Asia-Pacific
  • AustraliaEnglish
  • Chinese Simplified简体中文
  • Chinese Traditional繁體中文
  • IndiaEnglish
  • Japan日本語
  • Korea한국어
  • SingaporeEnglish
Europe, Middle East and Africa
  • BulgariaБългарски
  • CzechČeština
  • EuropeEnglish
  • FranceFrançais
  • GermanyDeutsch
  • Israelעברית
  • ItalyItaliano
  • PolandPolski
  • RomaniaRomână
  • SpainEspañol
  • SwedenSvenska
  • SwitzerlandDeutsch
  • TürkiyeTürkçe
  • United KingdomEnglish
  • HungaryMagyar
  • NetherlandsDutch
  • Americas
    • BrasilPortuguês
    • CanadaEnglish
    • CanadaFrançais
    • LATAMEspañol
    • United StatesEnglish
  • Asia-Pacific
    • AustraliaEnglish
    • Chinese Simplified简体中文
    • Chinese Traditional繁體中文
    • IndiaEnglish
    • Japan日本語
    • Korea한국어
    • SingaporeEnglish
  • Europe, Middle East and Africa
    • BulgariaБългарски
    • CzechČeština
    • EuropeEnglish
    • FranceFrançais
    • GermanyDeutsch
    • Israelעברית
    • ItalyItaliano
    • PolandPolski
    • RomaniaRomână
    • SpainEspañol
    • SwedenSvenska
    • SwitzerlandDeutsch
    • TürkiyeTürkçe
    • United KingdomEnglish
    • HungaryMagyar
    • NetherlandsDutch
  • Login for service providersAcronis Cyber Protect Cloud
  • Login for business customersAcronis Cyber Protect, Acronis Snap Deploy
  • Login for home usersAcronis True Image
  • Login to Partner PortalAcronis Partner Portal
  • Login to ConnectAcronis Cyber Protect Connect
  • Products
    For service providers
    Acronis Cyber Protect CloudEmpowering service providers with backup, DR, cybersecurity, and endpoint management in one integrated solution.
    Cybersecurity
    XDREDRMDRDLP
    Data protection
    Advanced BackupDisaster RecoveryNotarization & eSignature
    Microsoft 365 protection
    Ultimate 365Backup for Microsoft 365Security Posture ManagementEmail SecurityEmail Archiving for Microsoft 365Collaboration SecuritySecurity Awareness Training (SAT)
    MSP operations
    RMMPSA
    • Try it free
    For service providers, telco's and ISPs
    Acronis Cyber Protect Home & BusinessSecure backup and anti-malware solution for small offices and home users.
    For businesses
    Acronis Cyber ProtectThe most secure backup and rapid recovery with natively integrated security and endpoint management for reliable business continuity.

    Backup | Security | Endpoint Management
    • Try it free
    For enterprise
    Acronis Cyber Protect EnterpriseThe most secure backup and fastest recovery for Enterprise, designed specifically for multi-site, multi-generational and industrial IT.

    Backup | Security | Endpoint Management
    • Book a call
    For businesses
    Acronis Snap DeployA user-friendly solution that lets you provision all your workstations and servers like you are provisioning just one.
    • Try it free
    For operational technology
    Acronis Cyber Protect OT
    New
    Leading solution for resilience, continuity and compliance across operational technology (OT) infrastructure.
    • Book a call
    For home
    Acronis True Image
    -50%
    Formerly Acronis Cyber Protect Home Office, it's the only personal cyber protection solution that delivers easy-to-use, integrated backup and anti-malware in one.
    • Buy now
    For everyone
    Acronis Cyber Protect ConnectA remote desktop and monitoring solution that enables you to easily access and manage remote workloads and fix any issues – anytime, anywhere.
    • All products
    Looking to update or renew your product or contact us for help?
  • Solutions
    Solutions
    For service providers
    For business
    • Microsoft 365 backup and recovery
    • Endpoint protection
    • Hybrid disaster recovery
    • Disaster recovery to Azure
    • Prevention
    • Managed server backup
    • Solutions for service providers
    • Ransomware protection
    • Managed anti-malware protection
    • Hosting service providers
    • MSP patch management
    • Recovery
    • URL filtering and categorization
    • Management
    • Automation
    • Security
    • Data Protection
    • All integrations
  • Pricing
    • For Service Providers
    • For Businesses & Enterprise
    • For Home
  • Partners
    Partner with Acronis
    • Acronis Partner ProgramMeet customer demand with one partner program for MSPs, VARs, OEMs and Hybrid Partners
    • Join the partner program
    • Acronis Technology Alliances Program (TAP)Integrate with Acronis to build powerful solutions for the MSP ecosystem
    Partner success kit
    • MSP AcademyTraining and resources to grow your MSP business
    • Active promotionsExplore current deals and limited-time offers
    • Partner CertificationPartners now have access to all sales and technical training — a $999 annual value per partner
    Locators
    • Find an IT providerBrowse verified Acronis IT service providers worldwide by region and specialization
    • Find a distributorBrowse verified Acronis distributors worldwide by type and location
  • Support & Resources
    Support
    • Customer service and supportGet help, find answers, and contact our support team
    • Product documentationEverything you need to understand and use the product
    • Support knowledge baseSelf-service support with guides and solutions
    Resources
    • Resource centerAll-in-one hub for expert insights and resources
    • Acronis blogExplore articles on security, backup, and innovation
    • Acronis Threat Research unitInsights on cyber protection, tech trends, and news
    Webinars
    • Upcoming events and webinarsRegister for live demos and webinars led by Acronis experts
    • On-Demand webinarsWatch on-demand webinars at your convenience and learn from Acronis' top experts
  • Why Acronis
    • About AcronisLearn about our mission, vision, and team
    • Industry recognitionsRecognized by industry leaders for innovation and excellence
    • Compliance and certificationSee how we meet global compliance and regulatory requirements
    • Customer storiesReal-world success stories from our global clients
    • Acronis vs competitionWhy businesses choose Acronis over the competition
  • Trials
    • For Service Providers
    • For business and enterprise
    • For Home
  • Buy online
    • For business and enterprise
    • For Home
  • Contact us
    • Contact sales
    • Contact renewals
    • Contact support
Choose region and language
Americas
  • BrasilPortuguês
  • CanadaEnglish
  • CanadaFrançais
  • LATAMEspañol
  • United StatesEnglish
Asia-Pacific
  • AustraliaEnglish
  • Chinese Simplified简体中文
  • Chinese Traditional繁體中文
  • IndiaEnglish
  • Japan日本語
  • Korea한국어
  • SingaporeEnglish
Europe, Middle East and Africa
  • BulgariaБългарски
  • CzechČeština
  • EuropeEnglish
  • FranceFrançais
  • GermanyDeutsch
  • Israelעברית
  • ItalyItaliano
  • PolandPolski
  • RomaniaRomână
  • SpainEspañol
  • SwedenSvenska
  • SwitzerlandDeutsch
  • TürkiyeTürkçe
  • United KingdomEnglish
  • HungaryMagyar
  • NetherlandsDutch
  • Americas
    • BrasilPortuguês
    • CanadaEnglish
    • CanadaFrançais
    • LATAMEspañol
    • United StatesEnglish
  • Asia-Pacific
    • AustraliaEnglish
    • Chinese Simplified简体中文
    • Chinese Traditional繁體中文
    • IndiaEnglish
    • Japan日本語
    • Korea한국어
    • SingaporeEnglish
  • Europe, Middle East and Africa
    • BulgariaБългарски
    • CzechČeština
    • EuropeEnglish
    • FranceFrançais
    • GermanyDeutsch
    • Israelעברית
    • ItalyItaliano
    • PolandPolski
    • RomaniaRomână
    • SpainEspañol
    • SwedenSvenska
    • SwitzerlandDeutsch
    • TürkiyeTürkçe
    • United KingdomEnglish
    • HungaryMagyar
    • NetherlandsDutch
Acronis DeviceLock DLP
MenuMenu
Acronis DeviceLock DLP
Overview
Features
Specifications
Features
Specifications
……
Acronis

Stop data leaks at the source with complete endpoint data loss prevention (DLP)

……

Devices access control

Ensure there’s no leakage of data through local channels by controlling which users or groups can access ports, peripheral, storage, redirected, and mobile devices. Access controls can be enforced depending on the time of day and day of the week.
Devices access control

Screen capturing control

Prevent data theft by blocking screenshot operations via Windows PrintScreen or screen capturing features of third-party apps for certain users or groups. Textual data in captured screen images can be extracted and filtered according to content-aware DLP policies.
Screen capturing control

Centralized management and deployment

Ease the labor-intensive and resource-consuming processes of DLP deployment and managment by choosing from a flexible set of central management consoles with the same UI. Depending on the organization’s IT environment, SMBs or large enterprises can choose the console that best fit their needs.

Centralized management and deployment
  • Active Directory integration
    Cut learning times and administrative efforts with a console based on the custom Acronis DeviceLock MMC snap-in to the Microsoft Group Policy Management Console used as the Active Directory Group Policy interface. This native integration enables Acronis DeviceLock DLP agents to be deployed and fully managed via Group Policies.
  • Non Active Directory environments
    In non-AD environments, administration is done through Acronis DeviceLock Enterprise Manager, a native Windows app that runs on a separate computer. DLP policies are delivered to all agents (pushed or pulled) via Acronis DeviceLock Enterprise Server (DLES).
  • Directory-less installations
    In such IT environments, e.g. in a Windows for Workgroups network, as well as for managing Acronis DeviceLock Discovery, the custom Acronis DeviceLock MMC snap-in can be used to remotely manage agents on per-endpoint basis.

Proactive protection

  • Tamper protection
    Universal

    Tamper protection

    Enforce process compliance by preventing tampering with DLP policy settings locally on protected endpoints, even by users with local system administrator privileges. Only designated Acronis DeviceLock DLP administrators can uninstall or upgrade the agent, or modify DLP policies.
  • Printing security
    Universal

    Printing security

    Control network and local printing from Windows endpoints by enforcing DLP policies over user access and content of printed documents for network, local, and virtual printers. Ensure higher data security by intercepting and inspecting print spooling operations, allowlisting of USB-connected printers, and print data shadowing.
  • Network-awareness
    Universal

    Network-awareness

    Administrators can define different online vs. offline DLP policies for the same user or user group. A reasonable and often necessary setting on a mobile user’s laptop, for example, is to disable Wi-Fi when docked to the corporate network and enable it when undocked.

Allowlisting

Allow granular controls over data access and transfer operations with the ability to manage exclusions to general DLP rules through wide allowlisting capabilities.

Allowlisting
  • Core
    USB allowlist
    Allows administrators to authorize a specific model of devices or particular device, distinguished by a unique identifier such as a serial number, to access the USB port, while locking out all other devices.
  • Core
    Media allowlist
    Ease the distribution of authorized software by authorizing the use of specific DVD, BD, and CD-ROM disks, uniquely identified by data signature. Granularly control authorized users and groups that can access them.
  • Core
    Temporary USB allowlist
    For using USB devices on endpoints working out of the corporate network, a temporary access to a USB-connected device can be provided by issuing an access code delivered to the user out of-band, rather than through regular Acronis DeviceLock DLP permissions procedures.

Increase process compliance

  • Virtual DLP
    Universal

    Virtual DLP

    Prevent data leaks via BYOD devices when using leading remote virtualization solutions. Running on a VDI host or terminal server, Acronis DeviceLock DLP enforces context- and content-aware controls over data exchanges between the virtual workspace and the personal part of the BYOD device, its local peripherals, and the network.
  • Removable media encryption integration
    Core

    Removable media encryption integration

    Increase data security when copying information to removable media by allowing data to only upload to removable storage encrypted by a set of best-of-breed, integrated encryption solutions. Selectively allowlist encrypted USB media to strengthen internal compliance.
  • Alerting
    Universal

    Alerting

    Shorten reaction times with real-time notifications on DLP-sensitive user activities on protected endpoints within and outside the corporate network. Acronis DeviceLock DLP provides SNMP, SYSLOG, and SMTP based alerting capabilities to SIEM systems and administrators.

Reporting

To ease information security auditing and compliance reporting and gain deeper visibility into data flows and data protection, Acronis DeviceLock DLP offers a wide choice of reporting capabilities.

  • Graphical reports
    Graphical reports - based on logs.
  • Permissions reports
    Permissions reports - display permissions and audit rules set on all endpoints across the network.
  • Plug-and-play device
    Plug-and-play device reports - display USB, FireWire, and PCMCIA devices currently or historically connected to endpoints in the network.

Comprehensive log collection for increased visibility

  • Auditing
    Universal

    Auditing

    Track user and file activities for specified device types, ports, and network resources on a computer and collect logs with GMT timestamps centrally in a Microsoft SQL or Postgres database. Pre-filter audit activities by event and context. Audit logs can be exported to many standard file formats for use in other reporting tools.
  • Data shadowing
    Core

    Data shadowing

    Enable security compliance auditing, incident investigations, and cyber forensics by mirroring data transferred without authorization via local and network channels. Leverage data shadowing that’s triggered based on operations context and content. Pre-filter shadow activities for network load balancing.
  • Monitoring
    Universal

    Monitoring

    Monitor remote computers in real-time with Acronis DLES, checking agents’ status, policy consistency, and policy integrity and writing information to the monitoring log. Define a master policy to be applied across selected remote computers in the event that their current DLP policies are out-of-date or damaged.

Acronis DeviceLock DLP

72% of employees share sensitive information. Prevent any data leaks headed your way.

……

Resources

  • Datasheet
    Acronis DeviceLock DLP Overview
  • User manual
    Acronis DeviceLock DLP 9.0
  • User manual
    Acronis DeviceLock Discovery 9.0
More documents

Looking for help?

Frequently asked questions

  • Can Acronis DeviceLock DLP function without internet connection?

    There are two different sets of DLP policies, Regular and Offline, which are automatically applied to a controlled endpoint by Acronis DeviceLock DLP agents depending on its network status. The Offline policy can be triggered by the laptop using either cached or confirmed Windows credential authentication, whether it can connect to any of its known Acronis DeviceLock Enterprise Servers, or if in a wired vs. unwired state.

  • Is Acronis DeviceLock DLP capable of “passive mode” functioning, i.e. not restricting data transfer, but logging and shadow copying?

    Yes, Acronis DeviceLock DLP is capable of functioning in any administrator set mode. We also call this “observation mode”.

    In cases where access to ports, devices, or network protocols is not blocked or content-filtered by policy, logging and data shadowing policy can be actively logging and keeping records in audit and shadow logs in “passive mode”.

    If there is a restrictive access policy active, Acronis’ DLP solution blocks the transfer and prevents data leakage on a controlled endpoint in real time.

  • Is there an option to configure various access control policies for laptops in- and out of the corporate network?

    Yes, there is. Acronis DeviceLock DLP supports various on- and off-corporate-line security policies. This way you can have one policy when the laptop is behind the firewall or DMZ and a totally different policy when the laptop is out in the wild, strengthening DLP security.

Product help

In case you have any difficulties, we have collected all the useful materials for this product in our FAQ and Documentation. Also you can always ask your question on our Discussion Boards.

Technical support

Customers with active product maintenance or subscription are entitled to 24/7 technical support. Follow the instructions at the Technical Support Site to get prompt support by phone, chat or e-mail.

  • Company
    Press Releases
    Careers
    Contacts
    Cloud Data Centers
    Forum
  • Service Providers
    Resellers
    Developers and ISVs
    Affiliates
    OEMs
  • Active Protection
    AnyData Engine
    Acronis Notary
    Universal Restore
    Anti-malware
    View all
  • Management
    Automation
    Security
    Data Protection
    View all
  • Acronis #CyberFit Sports
    Acronis Cyber Foundation
    TRU security
    Professional Services
  • ConnectWise
  • Datto
    Kaseya
    Veeam
    ESET
    SentinelOne
    View all
  • Physical
    Virtual
    Cloud
    Endpoints
    Applications
    Mobile
  • About Acronis
  • Company
  • Press Releases
  • Careers
  • Contacts
  • Cloud Data Centers
  • Forum
  • For partners
  • Service Providers
  • Resellers
  • Developers and ISVs
  • Affiliates
  • OEMs
  • Technologies
  • Active Protection
  • AnyData Engine
  • Acronis Notary
  • Universal Restore
  • Anti-malware
  • View all
  • Integrations
  • Management
  • Automation
  • Security
  • Data Protection
  • View all
  • Programs & Services
  • Acronis #CyberFit Sports
  • Acronis Cyber Foundation
  • TRU security
  • Professional Services
  • Vendor Alliance
  • ConnectWise
  • Compare to
  • Datto
  • Kaseya
  • Veeam
  • ESET
  • SentinelOne
  • View all
  • Environments
  • Physical
  • Virtual
  • Cloud
  • Endpoints
  • Applications
  • Mobile
Engage with Acronis

Tips, news and promo offers

  • Legal information
  • Privacy policy
  • Cookie Notice
  • Notice of collection
  • Sustainability & governance
© 2003–2025 Acronis International GmbH.

Sorry, your browser is not supported.

It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.

© 2003–2025 Acronis International GmbH. All rights reserved.
Legal information