IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

DeviceLock 7 review

Accidental or deliberate data leakage is now a major security headache for businesses. Dave Mitchell takes a look at DeviceLock 7 to see if it plugs those holes that others leave behind.

Agent deployment to our Windows 7 clients only took a few minutes as the Enterprise Manager scanned our network and provided a list of discovered systems for selection. A global policy is provided so you can lock down access to specific devices and ports as soon as the agent has been installed.

SMTP controls are good as we allowed some users to send emails, but not add attachments, and stopped others from sending any emails at all.

Moving over to the MMC console allows you to create new policies for selected AD users and groups which contain device and port permissions plus time periods for when they are active. Offline policies can control mobile workers and swing into action when DeviceLock detects they have left the main network.

The NetworkLock component is accessed from the new Protocols section in the MMC console. Policy creation is the same as it is for ports and devices. You select a protocol, determine access levels and apply it to users and groups.

SMTP controls are good as we allowed some users to send emails, but not add attachments, and stopped others from sending any emails at all. This also works over SSL. For FTP we could allow full access, permit either upload or download activities or deny all access.

It initially appears possible to prevent users from using Windows Live Messenger to send instant messages or to prevent them from logging on in the first place. However, we found a problem here as both options are interdependent so they can only be on or off together so all you can do is block access completely. This isn't a critical problem since Messenger would be of limited value without the ability to send instant messanges, but we nevertheless highlighted this to DeviceLock and it advised us it was looking into it.

Featured Resources

2023 Strategic roadmap for data security platform convergence

Capitalise on your data and share it securely using consolidated platforms

Free Download

The 3D trends report

Presenting one of the most exciting frontiers in visual culture

Free Download

The Total Economic Impact™ of IBM Cloud Pak® for Watson AIOps with Instana

Cost savings and business benefits

Free Download

Leverage automated APM to accelerate CI/CD and boost application performance

Constant change to meet fast-evolving application functionality

Free Download

Recommended

Selecting a fit-for-purpose server platform for datacentre infrastructure
Whitepaper

Selecting a fit-for-purpose server platform for datacentre infrastructure

15 Jun 2022
What is the semantic web?
Business strategy

What is the semantic web?

8 Jun 2022
Ten ways to protect your company from the next big data breach
data breaches

Ten ways to protect your company from the next big data breach

18 Feb 2022
Modernise your server infrastructure for speed and security
Whitepaper

Modernise your server infrastructure for speed and security

9 Feb 2022

Most Popular

Warning issued over ransomware attacks targeting VMware ESXi servers globally
cyber attacks

Warning issued over ransomware attacks targeting VMware ESXi servers globally

6 Feb 2023
ION Trading reportedly pays LockBit ransom demands
ransomware

ION Trading reportedly pays LockBit ransom demands

6 Feb 2023
BT Group extends Kyndryl deal to migrate legacy mainframe apps to the cloud
Business strategy

BT Group extends Kyndryl deal to migrate legacy mainframe apps to the cloud

31 Jan 2023