DriveLock Device Control/Whitelisting
Device Control/Whitelisting limits use of pre-approved specific devices to pre-approved users/groups/networks at configured times.
What is device control
The USB stick continues to play an important role when it comes to the exchange of data. To prevent sensitive information from falling into the wrong hands, DriveLock monitors transactions made via USB data carriers.
Employees also use corporate USB ports to charge mobile phones or other devices. It is possible, through this, for malware to quickly get onto a device and into the systems.
Research shows that 80% of workers have already copied data from or to a USB stick or have paired devices to the USB port for loading without taking the consequences into account.
Documents which file was copied and to which medium
Automatically and securely encrypts external USB data carriers
Trains employees regarding the safe handling of data and external data carriers
Extensive forensic analysis and reporting options
Package comes with:
- Analytics & Forensic
- Security awareness campaigns
- Device Control
- File filter and data-flow control
(Min) Server OS Requirements:
– Windows Server 2012 R2+
– Quad-Core 2GHz+
– Memory 8GB+
– 60GB HDD+
Clients OS Requirements:
– Windows XP, Vista, 7, 8, 10
MS SQL Server 2012/14/16/19 Std/Ent/Express
This Solution can also provide
Application Control/Whitelisting (Optional)
Securely run only pre-approved applications/dll’s. Utilise a variety of rules to approve and trust. EG: certificate, owner, location, hash
Comprehensive Reporting (included)
Understand what has been blocked/allowed and why. With advanced filtering it makes it easy to see all your endpoints with ease.
Security Awareness (basic)
Help train your colleagues with advances awareness campaigns that can be triggered on an event. Such as USB insert of a non company approved device.
Full Disk Encryption (FDE) (optional)
Securely encrypt your entire drive. Provide a customised single sign on boot option to maintain corporate identity and security.
Forensics Examinations (included)
Supports automated software distribution, as well as centralized patch management systems easily. Drill Down and Sub-query the data with just a click.
File and Folder/Container Encryption (included)
Encrypt files on USB/CDROM before they leave your company. File Shadowing and File Type Filtering ensure that company data is safe.