
DeviceLock DLP
Stop data leaks at the source with complete endpoint data loss prevention (DLP)
System requirements
Version information and system requirements
Version
- 9.0 (Build 91650)
Management consoles
- Windows XP / Vista / 7 / 8 / 8.1 / 10 / Server 2003-2019 (32/64-bit)
- CPU Pentium 4, 512MB RAM, HDD 1GB
Agents
- Windows XP / Vista / 7 / 8 / 8.1 / 10 (up to 21H2) / Server 2003-2019 (32/64-bit)
- Apple macOS 10.15 -11.2.3 (32/64-bit)
- Microsoft RDS, Citrix XenDesktop / XenApp, Citrix XenServer, VMware Horizon View
- VMware Workstation, VMware Player, Oracle VM VirtualBox, Windows Virtual PC
- CPU Pentium 4, 512MB RAM, HDD 400MB
Acronis DeviceLock Enterprise Server, Acronis DeviceLock Discovery Server, Acronis DeviceLock Search Server
- Windows Server 2003-2019 (32/64-bit), Microsoft RDS, Citrix XenServer, VMware vSphere Desktop
- 2xCPU Intel Xeon Quad-Core 2.33GHz, RAM 8GB, HDD 800GB (if hosting SQL DB, less if not)
- SQL Express / MS SQL Server 2005-2017 or PostgreSQL 9.5 and newer
Device types controlled
Windows
- Removable storage (flash drives, memory cards, PC Cards, eSATA, etc.), CD-ROM/DVD/BD, floppies, hard drives, tapes, Wi-Fi and Bluetooth adapters, Apple iPhone/iPod touch/ iPad, Windows Mobile, Palm OS, BlackBerry, MTP-enabled devices (such as Android and Windows Phone), printers (local, network and virtual), modems, scanners, cameras
Mac
- Removable storage, hard drives, CD/DVD/BD, Wi-Fi, and Bluetooth adapters
Session terminal/BYOD
- Mapped drives (removable, optical, hard), USB devices
Ports secured
Windows
- USB, FireWire, Infrared, Serial, Parallel
Mac
- USB, FireWire, Serial
Session terminal/BYOD
- USB, Serial
Clipboard control
Between applications
- Inter-application clipboard copy/paste operations
Windows
- Data transfers between Windows and desktop/application session clipboards
Controlled data types
- Files, textual data, images, audio, unidentified data with text content filtering
Screenshot operations
- PrintScreen and third-party applications
Virtualized sessions
- Copy operations between host and guest OS clipboards
Network communications controlled
- SMTP/SMTPS, Microsoft Outlook (MAPI), IBM Notes
Instant messengers
- Skype/Skype for Web/Skype for Business/Microsoft Lync 2013, ICQ Messenger, Zoom, Viber, IRC, Jabber, Windows Messenger, Mail.ru Agent, WhatsApp, Telegram
Career search
- CareerBuilder, College Recruiter, craigslist, Dice, Glassdoor, GovernmentJobs, HeadHunter.com, Hired, Indeed, JobisJob, Mediabistro, Monster, Simply Hired, Ladders, us.jobs, USAJOBS, ZipRecruiter, Rabota.ru, Yandex.Rabota, SuperJob.ru, hh.ru, Avito.ru
Webmail
- AOL Mail, Gmail, Hotmail/Outlook.com, GMX.de, Web.de, T-online.de, freenet.de, Yahoo! Mail, Mail.ru, Rambler Mail, Yandex Mail, Outlook Web App/Access (OWA), NAVER, ABV Mail, Zimbra Collaboration, Google Workspace Sync for Microsoft Outlook (G-Suite)
Cloud file sharing web services
- Amazon S3, Dropbox, Box, Google Docs/Google Drive, OneDrive, iCloud, GMX.de, Web.de, MagentaCLOUD, freenet.de, Cloud Mail.ru, Yandex.Disk, Sendspace, MediaFire, WeTransfer, 4shared, GitHub, MEGA, AnonFile, dmca.gripe, DropMeFiles, Easyupload.io, Files.fm, Gofile.io, transfer.sh, TransFiles.ru, Uploadfiles.io
Internet protocols
- HTTP/HTTPS, FTP/FTPS, Telnet
Social networking
- Facebook, Twitter, Google+, LinkedIn, Tumblr, Instagram, Pinterest, MySpace, Vkontakte, XING.com, LiveJournal, MeinVZ.de, StudiVZ.de, Disqus, LiveInternet.ru, Odnoklassniki.ru
Web search
- Google, Yandex, Bing, Baidu, Yahoo, Mail.Ru, Ask.com, AOL Search, Rambler, Wolfram Alpha, DuckDuckGo, WebCrawler, Search.com, Wayback Machine, Dogpile, StartPage, Excite, NAVER, Web.de
Other
- SMB shares, Skype Private Conversations, Skype media calls, Zoom meetings, Torrent, Tor Browser traffic
Content-aware controls
Controlled channels
- Storage devices (removable, floppy, optical CD/DVD/BD drives), printers (local, network, virtual), Windows clipboard, redirected mapped drives and clipboard of terminals/BYOD devices, network communications (email, webmail, IM, social networks, cloud file sharing services, web searches, career search requests , HTTP/HTTPS, FTP/FTPS, SMB)
Binary data detection methods
- Data fingerprints
Content-aware data shadowing
- For controlled channels and content types
Content types controlled
- Textual content, binary data, data types
Textual content detection methods
- Keyword dictionaries (160+ prebuilt, user-configurable) with morphological analysis (English, French, German, Italian, Russian, Spanish, Catalan Spanish, Portuguese, Polish), RegExp templates (90+ prebuilt, user-configurable), data fingerprints (partial/exact document matching) within Data Classifications
OCR Features
- Endpoint-resident OCR processing, 30+ languages, integrated DeviceLock keyword dictionaries and regular expressions, rotated/mirrored/inverted images
Textual content objects
- Parsable file formats (100+) and archives (40+), textual data (in emails, messages, web forms, etc.), images (OCR processing), unidentified binary data, data objects classified by Boldon James Classifier
Controlled data types
- Verified file types (5300+), file/document properties, embedded image properties, clipboard data types (files, textual data, images, audio, unidentified), sync protocol objects (Microsoft ActiveSync®, WMDC, Apple iTunes®, Palm® HotSync), data objects classified by Boldon James Classifier
Encryption integration
Windows
- Windows BitLocker To Go™, Sophos® SafeGuard Easy®, SecurStar® DriveCrypt®, TrueCrypt®, PGP® Whole Disk Encryption, Infotecs SafeDisk®, SafeToGo, Rutoken Disk
Mac
- Apple® OS X FileVault
Content discovery
Scan targets
- Windows endpoint computers (file systems, email repositories, mounted peripherals), Windows Servers, network shares, NAS systems, synchronization folders of cloud-based file hosting applications, Elasticsearch databases
Scan modes
- Agentless, agent-based, mixed
Remediation actions
- Delete, Safe Delete, Delete Container, Set Permissions (for NTFS files), Log, Alert, Notify User, Encrypt (using EFS for NTFS files)
Scan operations
- Manual and scheduled automatic task execution
Other features
- Static and dynamic target list configuration, discovery reports, automatic on-demand Discovery Agent installation/removal
Virtual DLP for remote virtualization
Acronis DeviceLock DLP
- Controls redirected removable drives, network shares, USB devices, printers, clipboard, and serial ports via desktop and session remoting protocols (RDP, ICA, PCoIP, HTML5/WebSockets) as well as network communications of Virtual Desktop and Terminal Session clients.
Supported environments
- Microsoft RDS, Citrix XenDesktop/XenApp, Citrix XenServer, VMware Horizon View; VMware Workstation, VMware Player, Oracle VM VirtualBox, Windows Virtual PC
Full-text audit and shadow repository searching
Searchable data
- All parsed file formats and data types
Search logic
- “All words” (AND), default “hit count” weighting, configurable term and field weighting
Text in images
- Optical Character Recognition (OCR) allows the extraction of text from images for further indexing
Printout formats
- PCL, Postscript, and other printout formats
Search optimization
- Stemming and noise-word filtering for English, French, German, Italian, Japanese, Russian, and Spanish
Search scheduling
- Running searches by schedule and automatic emailing of search results
Search parameters
- Indexing and search based on: log record parameters, word, phrase, number
Synonym search
- Synonym text search for English and Russian languages
User activity monitor (UAM)
Event-driven recording
- Endpoint’s screen, on-screen user actions, keystrokes, information about applications used during recording
Log collection
- Automatic collection of locally gathered UAM records gathered on endpoint computers to the central log database
Granular controls
- Configurable screenshot capturing frequency and video resolution, independent online/offline UAM policies, UAM rule syntax validation before activation, color or black/white recording, multi-display support, pause while inactive, log passwords
UAM logs analysis
- Central and local UAM log viewers with 20+ filtered parameters
Recording conditions
- Start/stop UAM recording based on logical combination of system state, events and DLP-related events
Recorded sessions viewers
- Built-in video player for screen recordings, keystroke viewer with copy/print support, application/process list viewer
User dossiers
Reporting
- Collection of easy to understand graphical representations of end user action statistics
Behavioral analysis
- Individual and group averages indicators: user “loyalty”, user activity overview, activity charts for local and network channels, detailed top activities, interactive Relations Charts
Report optimization
- Configurable reporting periods, event folding, automatic data updates
DeviceLock DLP
72% of employees share sensitive information. Prevent any data leaks headed your way.
Sorry, your browser is not supported.
It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.