Index >> Security & Privacy >> Access Control >> DeviceLock
Report SpywareDeviceLock 6.2
Software Description:
DeviceLock - Access control solution for to floppy, CD-ROM, USB and other mobile devices.
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the week. DeviceLock enhances access control for Windows System Administrators and helps control removable disk usage. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. Network administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside.
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the week. DeviceLock enhances access control for Windows System Administrators and helps control removable disk usage. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. Network administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside.
Feature List:
- Control which users or groups can access USB and FireWire ports, WiFi and Bluetooth adapters, PDAs, CD-ROMs, floppy drives, other removable devices
- Control access to devices depending on the time of day and day of the week
- Authorize only specific USB devices that will not be locked regardless of any other settings
- Grant users temporary access to USB devices when there is no network connection (you provide users with the special access codes over the phone that temporarily unlock access to requested devices)
- Uniquely identify a specific DVD/CD-ROM disk by the data signature and authorize access to it, even when DeviceLock has otherwise blocked the DVD/CD-ROM drive
- Protect against users with local administrator privileges so they can't disable DeviceLock Service or remove it from their computers, if they are not in this list of DeviceLock administrators
- Set devices in read-only mode
- Protect disks from accidental or intentional formatting
- Detect and block hardware keyloggers (USB and PS/2)
- Deploy permissions and settings via Group Policy in an Active Directory domain
- Use the standard Windows RSoP snap-in to view the DeviceLock policy currently being applied, as well as to predict what policy would be applied in a given situation
- Control everything remotely using the centralized management console
- Get a complete log of port and device activity, such as uploads and downloads by users and filenames in the standard Windows Event Log that stores locally and/or in the special protected log that sends to DeviceLock Enterprise Server for centralized storage
- Mirror all data (shadowing) copied to external storage devices (removable, floppy, DVD/CD-ROM) and transferred via COM and LPT ports
- Store shadow data and audit logs on a centralized component of an existing server and any existing ODBC-compliant SQL infrastructure
- Generate a report concerning the permissions and settings that have been set
- Generate a report displaying the USB, FireWire and PCMCIA devices currently connected to computers and those that were connected
- Install and uninstall it automatically
100% Clean:
DeviceLock 6.2 is 100% clean
This download (devicelock.zip) was tested thoroughly and was found 100% clean. Click "Report Spyware" link on the top if you found this software contains any form of malware, including but not limited to: spyware, viruses, trojans and backdoors.
This download (devicelock.zip) was tested thoroughly and was found 100% clean. Click "Report Spyware" link on the top if you found this software contains any form of malware, including but not limited to: spyware, viruses, trojans and backdoors.
Related Software:
- Hide Files & Folders 3.594 - Hide Files & Folders from viewing and searching, or protect them by password
- 1 Click & Lock 3.495 - Secure your desktop when you step away from your PC
- Advanced Desktop Shield 10.0 - Protect public access PCs, stop users from changing desktop wallpaper and screen
- Easy File & Folder Protector 5.131 - Password protect files and folders by a time schedule
- Host Security Personal 1.40.115 - Password-protect files, folders, and drives. Firewall network and stop hackers!
- Outlook Express Security 2.394 - Disable access to Outlook Express and password-protect its message base.
- Advanced Internet Kiosk 7.76 - Build Internet kiosks, public access PCs, or in-store terminals.
- Transparent Screen Lock PRO for WinNT/2000/XP/2003 4.50 - Password protect your workstation or server while viewing programs in background
- Windows Security Officer 7.5.5.56 - It enables you to protect and totally control access to you PC
- FaceCode v - 2.0 - FaceCode face recognition PC logon software protecting your personal information
top 10 most downloaded
recommended software
-
- Folder Lock
- Folder Lock is a data security solution that encrypt & secures your files, while keeping an automatic and real-time backup of encrypted files in the b...
-
- Emsisoft Anti-Malware
- Emsisoft Anti-Malware is a premium anti-malware program to clean and protect your PC from all internet threats: viruses, spyware, trojans, bots, adwar...