Acronis
DeviceLock DLP

Stop data leaks at the source with complete endpoint data loss prevention (DLP)

Try now
No credit card required

System requirements

Version information and system requirements

Version

  • 9.0 (Build 91650)

    Management consoles

    • Windows XP / Vista / 7 / 8 / 8.1 / 10 / Server 2003-2019 (32/64-bit)
    • CPU Pentium 4, 512MB RAM, HDD 1GB

      Agents

      • Windows XP / Vista / 7 / 8 / 8.1 / 10 / 11 (up to 23H2) / Server 2003-2019 (32/64-bit)
      • Apple macOS 10.15 -11.2.3 (32/64-bit)
      • Microsoft RDS, Citrix XenDesktop / XenApp, Citrix XenServer, VMware Horizon View
      • VMware Workstation, VMware Player, Oracle VM VirtualBox, Windows Virtual PC
      • CPU Pentium 4, 512MB RAM, HDD 400MB

        Acronis DeviceLock Enterprise Server, Acronis DeviceLock Discovery Server, Acronis DeviceLock Search Server

        • Windows Server 2003-2019 (32/64-bit), Microsoft RDS, Citrix XenServer, VMware vSphere Desktop
        • 2xCPU Intel Xeon Quad-Core 2.33GHz, RAM 8GB, HDD 800GB (if hosting SQL DB, less if not)
        • SQL Express / MS SQL Server 2005-2017 or PostgreSQL 9.5 and newer

          Device types controlled

          Windows

          • Removable storage (flash drives, memory cards, PC Cards, eSATA, etc.), CD-ROM/DVD/BD, floppies, hard drives, tapes, Wi-Fi and Bluetooth adapters, Apple iPhone/iPod touch/ iPad, Windows Mobile, Palm OS, BlackBerry, MTP-enabled devices (such as Android and Windows Phone), printers (local, network and virtual), modems, scanners, cameras

            Mac

            • Removable storage, hard drives, CD/DVD/BD, Wi-Fi, and Bluetooth adapters

              Session terminal/BYOD

              • Mapped drives (removable, optical, hard), USB devices

                Ports secured

                Windows

                • USB, FireWire, Infrared, Serial, Parallel

                  Mac

                  • USB, FireWire, Serial

                    Session terminal/BYOD

                    • USB, Serial

                      Clipboard control

                      Between applications

                      • Inter-application clipboard copy/paste operations

                        Windows

                        • Data transfers between Windows and desktop/application session clipboards

                          Controlled data types

                          • Files, textual data, images, audio, unidentified data with text content filtering

                            Screenshot operations

                            • PrintScreen and third-party applications

                              Virtualized sessions

                              • Copy operations between host and guest OS clipboards

                                Network communications controlled

                                Email

                                • SMTP/SMTPS, Microsoft Outlook (MAPI), IBM Notes

                                  Instant messengers

                                  • Skype/Skype for Web/Skype for Business/Microsoft Lync 2013, ICQ Messenger, Zoom, Viber, IRC, Jabber, Windows Messenger, Mail.ru Agent, WhatsApp, Telegram

                                    Career search

                                    • CareerBuilder, College Recruiter, craigslist, Dice, Glassdoor, GovernmentJobs, HeadHunter.com, Hired, Indeed, JobisJob, Mediabistro, Monster, Simply Hired, Ladders, us.jobs, USAJOBS, ZipRecruiter, Rabota.ru, Yandex.Rabota, SuperJob.ru, hh.ru, Avito.ru

                                      Webmail

                                      • AOL Mail, Gmail, Hotmail/Outlook.com, GMX.de, Web.de, T-online.de, freenet.de, Yahoo! Mail, Mail.ru, Rambler Mail, Yandex Mail, Outlook Web App/Access (OWA), NAVER, ABV Mail, Zimbra Collaboration, Google Workspace Sync for Microsoft Outlook (G-Suite)

                                        Cloud file sharing web services

                                        • Amazon S3, Dropbox, Box, Google Docs/Google Drive, OneDrive, iCloud, GMX.de, Web.de, MagentaCLOUD, freenet.de, Cloud Mail.ru, Yandex.Disk, Sendspace, MediaFire, WeTransfer, 4shared, GitHub, MEGA, AnonFile, dmca.gripe, DropMeFiles, Easyupload.io, Files.fm, Gofile.io, transfer.sh, TransFiles.ru, Uploadfiles.io

                                          Internet protocols

                                          • HTTP/HTTPS, FTP/FTPS, Telnet

                                            Social networking

                                            • Facebook, Twitter, Google+, LinkedIn, Tumblr, Instagram, Pinterest, MySpace, Vkontakte, XING.com, LiveJournal, MeinVZ.de, StudiVZ.de, Disqus, LiveInternet.ru, Odnoklassniki.ru

                                              Web search

                                              • Google, Yandex, Bing, Baidu, Yahoo, Mail.Ru, Ask.com, AOL Search, Rambler, Wolfram Alpha, DuckDuckGo, WebCrawler, Search.com, Wayback Machine, Dogpile, StartPage, Excite, NAVER, Web.de

                                                Other

                                                • SMB shares, Skype Private Conversations, Skype media calls, Zoom meetings, Torrent, Tor Browser traffic

                                                  Content-aware controls

                                                  Controlled channels

                                                  • Storage devices (removable, floppy, optical CD/DVD/BD drives), printers (local, network, virtual), Windows clipboard, redirected mapped drives and clipboard of terminals/BYOD devices, network communications (email, webmail, IM, social networks, cloud file sharing services, web searches, career search requests , HTTP/HTTPS, FTP/FTPS, SMB)

                                                    Binary data detection methods

                                                    • Data fingerprints

                                                      Content-aware data shadowing

                                                      • For controlled channels and content types

                                                        Content types controlled

                                                        • Textual content, binary data, data types

                                                          Textual content detection methods

                                                          • Keyword dictionaries (160+ prebuilt, user-configurable) with morphological analysis (English, French, German, Italian, Russian, Spanish, Catalan Spanish, Portuguese, Polish), RegExp templates (90+ prebuilt, user-configurable), data fingerprints (partial/exact document matching) within Data Classifications

                                                            OCR Features

                                                            • Endpoint-resident OCR processing, 30+ languages, integrated DeviceLock keyword dictionaries and regular expressions, rotated/mirrored/inverted images

                                                              Textual content objects

                                                              • Parsable file formats (100+) and archives (40+), textual data (in emails, messages, web forms, etc.), images (OCR processing), unidentified binary data, data objects classified by Boldon James Classifier

                                                                Controlled data types

                                                                • Verified file types (5300+), file/document properties, embedded image properties, clipboard data types (files, textual data, images, audio, unidentified), sync protocol objects (Microsoft ActiveSync®, WMDC, Apple iTunes®, Palm® HotSync), data objects classified by Boldon James Classifier

                                                                  Encryption integration

                                                                  Windows

                                                                  • Windows BitLocker To Go™, Sophos® SafeGuard Easy®, SecurStar® DriveCrypt®, TrueCrypt®, PGP® Whole Disk Encryption, Infotecs SafeDisk®, SafeToGo, Rutoken Disk

                                                                    Mac

                                                                    • Apple® OS X FileVault

                                                                      Content discovery

                                                                      Scan targets

                                                                      • Windows endpoint computers (file systems, email repositories, mounted peripherals), Windows Servers, network shares, NAS systems, synchronization folders of cloud-based file hosting applications, Elasticsearch databases

                                                                        Scan modes

                                                                        • Agentless, agent-based, mixed

                                                                          Remediation actions

                                                                          • Delete, Safe Delete, Delete Container, Set Permissions (for NTFS files), Log, Alert, Notify User, Encrypt (using EFS for NTFS files)

                                                                            Scan operations

                                                                            • Manual and scheduled automatic task execution

                                                                              Other features

                                                                              • Static and dynamic target list configuration, discovery reports, automatic on-demand Discovery Agent installation/removal

                                                                                Virtual DLP for remote virtualization

                                                                                Acronis DeviceLock DLP

                                                                                • Controls redirected removable drives, network shares, USB devices, printers, clipboard, and serial ports via desktop and session remoting protocols (RDP, ICA, PCoIP, HTML5/WebSockets) as well as network communications of Virtual Desktop and Terminal Session clients.

                                                                                  Supported environments

                                                                                  • Microsoft RDS, Citrix XenDesktop/XenApp, Citrix XenServer, VMware Horizon View; VMware Workstation, VMware Player, Oracle VM VirtualBox, Windows Virtual PC

                                                                                    Full-text audit and shadow repository searching

                                                                                    Searchable data

                                                                                    • All parsed file formats and data types

                                                                                      Search logic

                                                                                      • “All words” (AND), default “hit count” weighting, configurable term and field weighting

                                                                                        Text in images

                                                                                        • Optical Character Recognition (OCR) allows the extraction of text from images for further indexing

                                                                                          Printout formats

                                                                                          • PCL, Postscript, and other printout formats

                                                                                            Search optimization

                                                                                            • Stemming and noise-word filtering for English, French, German, Italian, Japanese, Russian, and Spanish

                                                                                              Search scheduling

                                                                                              • Running searches by schedule and automatic emailing of search results

                                                                                                Search parameters

                                                                                                • Indexing and search based on: log record parameters, word, phrase, number

                                                                                                  Synonym search

                                                                                                  • Synonym text search for English and Russian languages

                                                                                                    User activity monitor (UAM)

                                                                                                    Event-driven recording

                                                                                                    • Endpoint’s screen, on-screen user actions, keystrokes, information about applications used during recording

                                                                                                      Log collection

                                                                                                      • Automatic collection of locally gathered UAM records gathered on endpoint computers to the central log database

                                                                                                        Granular controls

                                                                                                        • Configurable screenshot capturing frequency and video resolution, independent online/offline UAM policies, UAM rule syntax validation before activation, color or black/white recording, multi-display support, pause while inactive, log passwords

                                                                                                          UAM logs analysis

                                                                                                          • Central and local UAM log viewers with 20+ filtered parameters

                                                                                                            Recording conditions

                                                                                                            • Start/stop UAM recording based on logical combination of system state, events and DLP-related events

                                                                                                              Recorded sessions viewers

                                                                                                              • Built-in video player for screen recordings, keystroke viewer with copy/print support, application/process list viewer

                                                                                                                User dossiers

                                                                                                                Reporting

                                                                                                                • Collection of easy to understand graphical representations of end user action statistics

                                                                                                                  Behavioral analysis

                                                                                                                  • Individual and group averages indicators: user “loyalty”, user activity overview, activity charts for local and network channels, detailed top activities, interactive Relations Charts

                                                                                                                    Report optimization

                                                                                                                    • Configurable reporting periods, event folding, automatic data updates

                                                                                                                      Acronis DeviceLock DLP

                                                                                                                      72% of employees share sensitive information. Prevent any data leaks headed your way.

                                                                                                                      Sorry, your browser is not supported.

                                                                                                                      It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.