DeviceLock DLP
Just released

Stop data leaks at the source with complete endpoint data loss prevention (DLP)

Try now
No credit card required

System requirements

Version information and system requirements

Version

  • 9.0 (Build 91650)

Management consoles

  • Windows XP / Vista / 7 / 8 / 8.1 / 10/ Server 2003-2019 (32/64-bit)
  • CPU Pentium 4, 512MB RAM, HDD 1GB

Agents

  • Windows XP / Vista / 7 / 8 / 8.1 / 10 / Server 2003-2019 (32/64-bit)
  • Apple macOS 10.15 (32/64-bit)
  • Microsoft RDS, Citrix XenDesktop / XenApp, Citrix XenServer, VMware Horizon View
  • VMware Workstation, VMware Player, Oracle VM VirtualBox, Windows Virtual PC
  • CPU Pentium 4, 512MB RAM, HDD 400MB

Acronis DeviceLock Enterprise Server, Acronis DeviceLock Discovery Server, Acronis DeviceLock Search Server

  • Windows Server 2003-2019 (32/64-bit), Microsoft RDS, Citrix XenServer, VMware vSphere Desktop
  • 2xCPU Intel Xeon Quad-Core 2.33GHz, RAM 8GB, HDD 800GB (if hosting SQL DB, less if not)
  • SQL Express / MS SQL Server 2005-2017 or PostgreSQL 9.5 and newer

Device types controlled

Windows

  • Removable storage (flash drives, memory cards, PC Cards, eSATA, etc.), CD-ROM/DVD/BD, floppies, hard drives, tapes, Wi-Fi and Bluetooth adapters, Apple iPhone/iPod touch/ iPad, Windows Mobile, Palm OS, BlackBerry, MTP-enabled devices (such as Android and Windows Phone), printers (local, network and virtual), modems, scanners, cameras

Mac

  • Removable storage, hard drives, CD/DVD/BD, Wi-Fi, and Bluetooth adapters

Session terminal/BYOD

  • Mapped drives (removable, optical, hard), USB devices

Ports secured

Windows

  • USB, FireWire, Infrared, Serial, Parallel

Mac

  • USB, FireWire, Serial

Session terminal/BYOD

  • USB, Serial

Clipboard control

Between applications

  • Inter-application clipboard copy/paste operations

Windows

  • Data transfers between Windows and desktop/application session clipboards

Controlled data types

  • Files, textual data, images, audio, unidentified data with text content filtering

Screenshot operations

  • PrintScreen and third-party applications

Virtualized sessions

  • Copy operations between host and guest OS clipboards

Network communications controlled

Email

  • SMTP/SMTPS, Microsoft Outlook (MAPI), IBM Notes

Instant messengers

  • Skype/Skype for Web/Skype for Business/Microsoft Lync 2013, ICQ Messenger, Zoom, Viber, IRC, Jabber, Windows Messenger, Mail.ru Agent, WhatsApp, Telegram

Career search

  • CareerBuilder, College Recruiter, craigslist, Dice, Glassdoor, GovernmentJobs, HeadHunter.com, Hired, Indeed, JobisJob, Mediabistro, Monster, Simply Hired, Ladders, us.jobs, USAJOBS, ZipRecruiter, Rabota.ru, Yandex.Rabota, SuperJob.ru, hh.ru, Avito.ru

Webmail

  • AOL Mail, Gmail, Hotmail/Outlook.com, GMX.de, Web.de, T-online.de, freenet.de, Yahoo! Mail, Mail.ru, Rambler Mail, Yandex Mail, Outlook Web App/Access (OWA), NAVER, ABV Mail, Zimbra Collaboration

Cloud file sharing web services

  • Amazon S3, Dropbox, Box, Google Docs/Google Drive, OneDrive, iCloud, GMX.de, Web.de, MagentaCLOUD, freenet.de, Cloud Mail.ru, Yandex.Disk, Sendspace, MediaFire, WeTransfer, 4shared, GitHub, MEGA, AnonFile, dmca.gripe, DropMeFiles, Easyupload.io, Files.fm, Gofile.io, transfer.sh, TransFiles.ru, Uploadfiles.io

Internet protocols

  • HTTP/HTTPS, FTP/FTPS, Telnet

Social networking

  • Facebook, Twitter, Google+, LinkedIn, Tumblr, Instagram, Pinterest, MySpace, Vkontakte, XING.com, LiveJournal, MeinVZ.de, StudiVZ.de, Disqus, LiveInternet.ru, Odnoklassniki.ru

Web search

  • Google, Yandex, Bing, Baidu, Yahoo, Mail.Ru, Ask.com, AOL Search, Rambler, Wolfram Alpha, DuckDuckGo, WebCrawler, Search.com, Wayback Machine, Dogpile, StartPage, Excite, NAVER, Web.de

Other

  • SMB shares, Skype Private Conversations, Skype media calls, Zoom meetings, Torrent, Tor Browser traffic

Content-aware controls

Controlled channels

  • Storage devices (removable, floppy, optical CD/DVD/BD drives), printers (local, network, virtual), Windows clipboard, redirected mapped drives and clipboard of terminals/BYOD devices, network communications (email, webmail, IM, social networks, cloud file sharing services, web searches, career search requests , HTTP/HTTPS, FTP/FTPS, SMB)

Binary data detection methods

  • Data fingerprints

Content-aware data shadowing

  • For controlled channels and content types

Content types controlled

  • Textual content, binary data, data types

Textual content detection methods

  • Keyword dictionaries (160+ prebuilt, user-configurable) with morphological analysis (English, French, German, Italian, Russian, Spanish, Catalan Spanish, Portuguese, Polish), RegExp templates (90+ prebuilt, user-configurable), data fingerprints (partial/exact document matching) within Data Classifications

OCR Features

  • Endpoint-resident OCR processing, 30+ languages, integrated DeviceLock keyword dictionaries and regular expressions, rotated/mirrored/inverted images

Textual content objects

  • Parsable file formats (100+) and archives (40+), textual data (in emails, messages, web forms, etc.), images (OCR processing), unidentified binary data, data objects classified by Boldon James Classifier

Controlled data types

  • Verified file types (5300+), file/document properties, embedded image properties, clipboard data types (files, textual data, images, audio, unidentified), sync protocol objects (Microsoft ActiveSync®, WMDC, Apple iTunes®, Palm® HotSync), data objects classified by Boldon James Classifier

Encryption integration

Windows

  • Windows BitLocker To Go™, Sophos® SafeGuard Easy®, SecurStar® DriveCrypt®, TrueCrypt®, PGP® Whole Disk Encryption, Infotecs SafeDisk®, SafeToGo, Rutoken Disk

Mac

  • Apple® OS X FileVault

Content discovery

Scan targets

  • Windows endpoint computers (file systems, email repositories, mounted peripherals), Windows Servers, network shares, NAS systems, synchronization folders of cloud-based file hosting applications, Elasticsearch databases

Scan modes

  • Agentless, agent-based, mixed

Remediation actions

  • Delete, Safe Delete, Delete Container, Set Permissions (for NTFS files), Log, Alert, Notify User, Encrypt (using EFS for NTFS files)

Scan operations

  • Manual and scheduled automatic task execution

Other features

  • Static and dynamic target list configuration, discovery reports, automatic on-demand Discovery Agent installation/removal

Virtual DLP for remote virtualization

Acronis DeviceLock DLP

  • Controls redirected removable drives, network shares, USB devices, printers, clipboard, and serial ports via desktop and session remoting protocols (RDP, ICA, PCoIP, HTML5/WebSockets) as well as network communications of Virtual Desktop and Terminal Session clients.

Supported environments

  • Microsoft RDS, Citrix XenDesktop/XenApp, Citrix XenServer, VMware Horizon View; VMware Workstation, VMware Player, Oracle VM VirtualBox, Windows Virtual PC

Full-text audit and shadow repository searching

Searchable data

  • All parsed file formats and data types

Search logic

  • “All words” (AND), default “hit count” weighting, configurable term and field weighting

Text in images

  • Optical Character Recognition (OCR) allows the extraction of text from images for further indexing

Printout formats

  • PCL, Postscript, and other printout formats

Search optimization

  • Stemming and noise-word filtering for English, French, German, Italian, Japanese, Russian, and Spanish

Search scheduling

  • Running searches by schedule and automatic emailing of search results

Search parameters

  • Indexing and search based on: log record parameters, word, phrase, number

Synonym search

  • Synonym text search for English and Russian languages

User activity monitor (UAM)

Event-driven recording

  • Endpoint’s screen, on-screen user actions, keystrokes, information about applications used during recording

Log collection

  • Automatic collection of locally gathered UAM records gathered on endpoint computers to the central log database

Granular controls

  • Configurable screenshot capturing frequency and video resolution, independent online/offline UAM policies, UAM rule syntax validation before activation, color or black/white recording, multi-display support, pause while inactive, log passwords

UAM logs analysis

  • Central and local UAM log viewers with 20+ filtered parameters

Recording conditions

  • Start/stop UAM recording based on logical combination of system state, events and DLP-related events

Recorded sessions viewers

  • Built-in video player for screen recordings, keystroke viewer with copy/print support, application/process list viewer

User dossiers

Reporting

  • Collection of easy to understand graphical representations of end user action statistics

Behavioral analysis

  • Individual and group averages indicators: user “loyalty”, user activity overview, activity charts for local and network channels, detailed top activities, interactive Relations Charts

Report optimization

  • Configurable reporting periods, event folding, automatic data updates

DeviceLock DLP

Just released

72% of employees share sensitive information. Prevent any data leaks headed your way.