DeviceLock DLP
Just released

Stop data leaks at the source with complete endpoint data loss prevention (DLP)

Try now
No credit card required

System requirements

Version information and system requirements


  • 9.0 (Build 91650)

Management consoles

  • Windows XP / Vista / 7 / 8 / 8.1 / 10/ Server 2003-2019 (32/64-bit)
  • CPU Pentium 4, 512MB RAM, HDD 1GB


  • Windows XP / Vista / 7 / 8 / 8.1 / 10 / Server 2003-2019 (32/64-bit)
  • Apple macOS 10.15 (32/64-bit)
  • Microsoft RDS, Citrix XenDesktop / XenApp, Citrix XenServer, VMware Horizon View
  • VMware Workstation, VMware Player, Oracle VM VirtualBox, Windows Virtual PC
  • CPU Pentium 4, 512MB RAM, HDD 400MB

Acronis DeviceLock Enterprise Server, Acronis DeviceLock Discovery Server, Acronis DeviceLock Search Server

  • Windows Server 2003-2019 (32/64-bit), Microsoft RDS, Citrix XenServer, VMware vSphere Desktop
  • 2xCPU Intel Xeon Quad-Core 2.33GHz, RAM 8GB, HDD 800GB (if hosting SQL DB, less if not)
  • SQL Express / MS SQL Server 2005-2017 or PostgreSQL 9.5 and newer

Device types controlled


  • Removable storage (flash drives, memory cards, PC Cards, eSATA, etc.), CD-ROM/DVD/BD, floppies, hard drives, tapes, Wi-Fi and Bluetooth adapters, Apple iPhone/iPod touch/ iPad, Windows Mobile, Palm OS, BlackBerry, MTP-enabled devices (such as Android and Windows Phone), printers (local, network and virtual), modems, scanners, cameras


  • Removable storage, hard drives, CD/DVD/BD, Wi-Fi, and Bluetooth adapters

Session terminal/BYOD

  • Mapped drives (removable, optical, hard), USB devices

Ports secured


  • USB, FireWire, Infrared, Serial, Parallel


  • USB, FireWire, Serial

Session terminal/BYOD

  • USB, Serial

Clipboard control

Between applications

  • Inter-application clipboard copy/paste operations


  • Data transfers between Windows and desktop/application session clipboards

Controlled data types

  • Files, textual data, images, audio, unidentified data with text content filtering

Screenshot operations

  • PrintScreen and third-party applications

Virtualized sessions

  • Copy operations between host and guest OS clipboards

Network communications controlled


  • SMTP/SMTPS, Microsoft Outlook (MAPI), IBM Notes

Instant messengers

  • Skype/Skype for Web/Skype for Business/Microsoft Lync 2013, ICQ Messenger, Zoom, Viber, IRC, Jabber, Windows Messenger, Agent, WhatsApp, Telegram

Career search

  • CareerBuilder, College Recruiter, craigslist, Dice, Glassdoor, GovernmentJobs,, Hired, Indeed, JobisJob, Mediabistro, Monster, Simply Hired, Ladders,, USAJOBS, ZipRecruiter,, Yandex.Rabota,,,


  • AOL Mail, Gmail, Hotmail/,,,,, Yahoo! Mail,, Rambler Mail, Yandex Mail, Outlook Web App/Access (OWA), NAVER, ABV Mail, Zimbra Collaboration

Cloud file sharing web services

  • Amazon S3, Dropbox, Box, Google Docs/Google Drive, OneDrive, iCloud,,, MagentaCLOUD,, Cloud, Yandex.Disk, Sendspace, MediaFire, WeTransfer, 4shared, GitHub, MEGA, AnonFile,, DropMeFiles,,,,,,

Internet protocols


Social networking

  • Facebook, Twitter, Google+, LinkedIn, Tumblr, Instagram, Pinterest, MySpace, Vkontakte,, LiveJournal,,, Disqus,,

Web search

  • Google, Yandex, Bing, Baidu, Yahoo, Mail.Ru,, AOL Search, Rambler, Wolfram Alpha, DuckDuckGo, WebCrawler,, Wayback Machine, Dogpile, StartPage, Excite, NAVER,


  • SMB shares, Skype Private Conversations, Skype media calls, Zoom meetings, Torrent, Tor Browser traffic

Content-aware controls

Controlled channels

  • Storage devices (removable, floppy, optical CD/DVD/BD drives), printers (local, network, virtual), Windows clipboard, redirected mapped drives and clipboard of terminals/BYOD devices, network communications (email, webmail, IM, social networks, cloud file sharing services, web searches, career search requests , HTTP/HTTPS, FTP/FTPS, SMB)

Binary data detection methods

  • Data fingerprints

Content-aware data shadowing

  • For controlled channels and content types

Content types controlled

  • Textual content, binary data, data types

Textual content detection methods

  • Keyword dictionaries (160+ prebuilt, user-configurable) with morphological analysis (English, French, German, Italian, Russian, Spanish, Catalan Spanish, Portuguese, Polish), RegExp templates (90+ prebuilt, user-configurable), data fingerprints (partial/exact document matching) within Data Classifications

OCR Features

  • Endpoint-resident OCR processing, 30+ languages, integrated DeviceLock keyword dictionaries and regular expressions, rotated/mirrored/inverted images

Textual content objects

  • Parsable file formats (100+) and archives (40+), textual data (in emails, messages, web forms, etc.), images (OCR processing), unidentified binary data, data objects classified by Boldon James Classifier

Controlled data types

  • Verified file types (5300+), file/document properties, embedded image properties, clipboard data types (files, textual data, images, audio, unidentified), sync protocol objects (Microsoft ActiveSync®, WMDC, Apple iTunes®, Palm® HotSync), data objects classified by Boldon James Classifier

Encryption integration


  • Windows BitLocker To Go™, Sophos® SafeGuard Easy®, SecurStar® DriveCrypt®, TrueCrypt®, PGP® Whole Disk Encryption, Infotecs SafeDisk®, SafeToGo, Rutoken Disk


  • Apple® OS X FileVault

Content discovery

Scan targets

  • Windows endpoint computers (file systems, email repositories, mounted peripherals), Windows Servers, network shares, NAS systems, synchronization folders of cloud-based file hosting applications, Elasticsearch databases

Scan modes

  • Agentless, agent-based, mixed

Remediation actions

  • Delete, Safe Delete, Delete Container, Set Permissions (for NTFS files), Log, Alert, Notify User, Encrypt (using EFS for NTFS files)

Scan operations

  • Manual and scheduled automatic task execution

Other features

  • Static and dynamic target list configuration, discovery reports, automatic on-demand Discovery Agent installation/removal

Virtual DLP for remote virtualization

Acronis DeviceLock DLP

  • Controls redirected removable drives, network shares, USB devices, printers, clipboard, and serial ports via desktop and session remoting protocols (RDP, ICA, PCoIP, HTML5/WebSockets) as well as network communications of Virtual Desktop and Terminal Session clients.

Supported environments

  • Microsoft RDS, Citrix XenDesktop/XenApp, Citrix XenServer, VMware Horizon View; VMware Workstation, VMware Player, Oracle VM VirtualBox, Windows Virtual PC

Full-text audit and shadow repository searching

Searchable data

  • All parsed file formats and data types

Search logic

  • “All words” (AND), default “hit count” weighting, configurable term and field weighting

Text in images

  • Optical Character Recognition (OCR) allows the extraction of text from images for further indexing

Printout formats

  • PCL, Postscript, and other printout formats

Search optimization

  • Stemming and noise-word filtering for English, French, German, Italian, Japanese, Russian, and Spanish

Search scheduling

  • Running searches by schedule and automatic emailing of search results

Search parameters

  • Indexing and search based on: log record parameters, word, phrase, number

Synonym search

  • Synonym text search for English and Russian languages

User activity monitor (UAM)

Event-driven recording

  • Endpoint’s screen, on-screen user actions, keystrokes, information about applications used during recording

Log collection

  • Automatic collection of locally gathered UAM records gathered on endpoint computers to the central log database

Granular controls

  • Configurable screenshot capturing frequency and video resolution, independent online/offline UAM policies, UAM rule syntax validation before activation, color or black/white recording, multi-display support, pause while inactive, log passwords

UAM logs analysis

  • Central and local UAM log viewers with 20+ filtered parameters

Recording conditions

  • Start/stop UAM recording based on logical combination of system state, events and DLP-related events

Recorded sessions viewers

  • Built-in video player for screen recordings, keystroke viewer with copy/print support, application/process list viewer

User dossiers


  • Collection of easy to understand graphical representations of end user action statistics

Behavioral analysis

  • Individual and group averages indicators: user “loyalty”, user activity overview, activity charts for local and network channels, detailed top activities, interactive Relations Charts

Report optimization

  • Configurable reporting periods, event folding, automatic data updates

DeviceLock DLP

Just released

72% of employees share sensitive information. Prevent any data leaks headed your way.