SmartLine Intros DeviceLock 6.0

SmartLine announced the general availability of DeviceLock v6.0

August 22, 2006

2 Min Read
Network Computing logo

SAN RAMON, Calif. -- SmartLine today announced the general availability of DeviceLock® v6.0, a release that comprehensively addresses the challenge of enforcing endpoint security policy and auditing activity for all plug-and-play ports, drives, and removable devices on Windows computers. An important milestone in SmartLine’s 10-year mission to deliver the most secure, stable, scalable, and feature-rich product on the market, DeviceLock v6.0 adds simplified policy enforcement, Media White List capabilities and more extensive auditing options including advanced data shadowing. DeviceLock administrators have precision control over which users and groups have what level of access to which devices on which computers and when that access is allowed. DeviceLock can discretely manage any physical Windows port and drive with its layered security architecture and White List options while ensuring that even local computer administrators cannot tamper with its enforcement.

"The harsh reality is corporate customers often need to be protected from themselves." said Jeremy Moskowitz, Group Policy MVP who runs "Out of the box, Group Policy might not give administrators the power they need to really protect corporate assets. Windows XP/SP2 does provide a rudimentary way to control some USB functions, but it doesn't go far enough."

DeviceLock’s new optional data shadowing capability significantly enhances the corporate IT auditor’s ability to ensure that sensitive information has not left the premises on removable media. It captures full copies of files that are copied to authorized removable devices, burned to CD/DVD or even printed by authorized end users. The shadow copies are then available for further analysis of any compressed, encrypted, or mis-named files, revealing any breaches of the company’s data integrity policy. DeviceLock will also capture log information on the user, host computer, associated time stamps, and other pertinent data to isolate the source of any breach. Now IT security officials can add this extra layer of monitoring to users with access to high-sensitivity data and establish one more deterrent to policy violators and ‘inside job’ perpetrators.

SmartLine Inc.

Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like

More Insights