DeviceLock Endpoint DLP Suite

Prevent Devastating Data Leaks by Securing the Endpoints of Your Network

DeviceLock DLP Suite consists of five modules that protect your organization from data leak threats:





Search Server



DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved to or from company laptops or desktop PCs via devices like phones, digital cameras, USB sticks, CD/DVD-R, tablets, printers or MP3 players. In addition, policies can be set and enforced for copy operations via the Windows Clipboard, as well as screenshot operations on the endpoint computer.


NetworkLock adds contextual-level control of user network communications via the Internet through such means as: company email, personal webmail, instant messaging services, social networks (like Facebook, Google+, Twitter), web surfing, FTP file transfers, as well as cloud-based file sharing services like Dropbox, SkyDrive and Google Drive.



ContentLock adds the capability to look inside files and other data objects (like emails and webmails, chats, blog posts, etc.) for sensitive information like social security numbers, credit card numbers, bank account numbers or other user-definable information and to make block-or-allow decisions based on policies having to do with file contents.


Discovery is a separately licensed component, which helps network administrators and security personnel locating certain types of content stored within and outside the limits of the corporate network. Discovering unwanted content is essential when trying to protect the company’s intellectual property, control employee activities and administer computer networks.


Search Server

Search Server is an optional separately licensed component, which provides full-text searching of logged data. The full-text search functionality is especially useful in situations when you need to search for shadow copies of documents based on their contents.


The DeviceLock® DLP Suite provides both contextual and content-based control for maximum data leak prevention at minimum upfront and total cost of ownership. Its multi-layered inspection and interception engine provides fine-grained control over a full range of data leakage pathways at the context level. For further confidence that no sensitive data is escaping, content analysis and filtering can be applied to endpoint data exchanges with removable media and PnP devices, as well as with the network. With DeviceLock, security administrators can precisely match user rights to job function with regard to transferring, receiving and storing data on corporate computers. The resulting secure computing environment allows all legitimate users’ actions to proceed unimpeded while blocking any inadvertent or deliberate attempts to perform operations outside of preset bounds.




A functional component of the DeviceLock DLP Suite, DeviceLock Discovery enables organizations to gain visibility and control over confidential “data at rest” stored across their IT environment in order to proactively prevent data breaches and achieve compliance with regulatory and corporate data security requirements.

Virtual DLP

DeviceLock’s Virtual DLP feature extends the reach of DeviceLock data leak prevention capabilities to a variety of virtual computing solutions. These include session-based and streamed desktops and applications, as well as local virtual machines on hypervisors. Supported desktop and application virtualization solutions from major vendors include: Microsoft RDS, Citrix XenApp, Citrix XenDesktop and VMware View.


Supported systems and browsers

Version Information and System Requirements:

  • Version: 8.1.63827
  • Agents: Windows NT/2000/XP/Vista/7/8/8.1/10/Server 2003-2012 R2 (32/64-bit); Apple OS X 10.6.8/10.7/10.8/10.9/10.10/10.11 (32/64-bit); Microsoft RDS, Citrix
  • XenDesktop/XenApp, Citrix XenServer, VMware Horizon View; VMware Workstation, VMware Player, Oracle VM VirtualBox, Windows Virtual PC; CPU Pentium 4, 512MB RAM, HDD 400MB
  • Consoles: Windows 2000/XP/Vista/7/8/8.1/10/Server 2003-2012 R2 (32/64-bit); CPU Pentium 4, 512MB RAM, HDD 1GB
  • DeviceLock Enterprise Server, DeviceLock Discovery Server, DeviceLock Search Server: Windows Server 2003-2012 R2 (32/64-bit), Microsoft RDS, Citrix XenServer, VMware vSphere Desktop; 2xCPU Intel Xeon Quad-Core 2.33GHz, RAM 8GB, HDD 800GB (if hosting SQL DB, less if not); MSEE/MSDE/SQL Server Express or MS SQL Server

Device Types Controlled:

  • Floppies
  • CD-ROMs/DVDs/BDs
  • Any removable storage (flash drives, memory cards, PC cards, etc.)
  • Hard drives
  • Tape devices
  • WiFi adapters
  • Bluetooth adapters
  • Apple iPhone/iPod touch/iPad, BlackBerry, Windows Mobile and Palm OS
  • MTP-enabled devices (Android, Windows Phone, etc.)
  • Printers (local, network and virtual)
  • Terminal Services devices

Ports Secured:

  • USB
  • FireWire
  • Infrared
  • Serial and parallel

Network Communications Controlled:

  • Email/Web Mail: MAPI (Microsoft Exchange), SMTP/SMTPS, IBM Notes (formerly Lotus Notes), Gmail, Yahoo! Mail, Hotmail (, AOL Mail, Microsoft Outlook Web App (OWA, formerly Outlook Web Access),,,, Rambler Mail, Yandex Mail
  • Social Networking: Facebook (+API), Twitter, Google+, LinkedIn, Tumblr, MySpace, Vkontakte (+API),, LiveJournal,,, Disqus,,
  • Instant Messengers: Skype, ICQ/AOL, Windows Live Messenger, Yahoo! Messenger, IRC, Jabber, WhatsApp Web, Agent
  • Cloud File Sharing Web Services: Google Drive, Dropbox, Box, OneDrive/SkyDrive, iCloud, Amazon S3, Yandex Disk, Cloud,,, (
  • Internet Protocols: HTTP/HTTPS, FTP/FTPS, Telnet, Torrent
  • Other: SMB disk shares

Get DeviceLock Endpoint DLP Suite NOW!