www.secure-it.com.my

DeviceLock Products
DeviceLock® 6.0

What's New in DeviceLock® 6.0 (versus 5.73):

  • DeviceLock® now supports data shadowing - the ability to mirror all data copied to external storage devices (removable, floppy, DVD/CD-ROM) and transferred via COM and LPT ports. A full copy of the files and data is saved. Shadowing is an extended function of DeviceLock® Audit and like auditing can be defined on a per-user basis.

  • A new Media White List feature allows you to uniquely identify a specific DVD/CD-ROM disk by the data signature and authorize access to it, even when DeviceLock® has otherwise blocked the DVD/CD-ROM drive. Any change to the content of the media will change the data signature, thus invalidating authorization. In this way, a white-listed disk cannot be used to introduce unwanted data to the network. A DeviceLock® Media White List can be configured to grant access to a collection of approved DVD/CD-ROM disks by certain users and groups, so that only authorized users are able to use the approved information.

  • DeviceLock® Enterprise Server is added for centralized collecting and storing of shadow files. DeviceLock® Enterprise Server uses MS SQL Server to store received data.

  • DeviceLock® Management Console (MMC snap-in) now includes a module for remote administration of DeviceLock® Enterprise Server. Using this console, you can manage DeviceLock® Service and administer DeviceLock® Enterprise Server at the same time.

  • For each DeviceLock® Service you can now define the name of the DeviceLock® Enterprise Server to which the service reports shadow files as soon as they arrive.

  • In the Service Options dialog you can now set a disk quota for shadowed data, ensuring that the user's free disk space is not overburdened.

  • Now you can view logged files using a built-in viewer on the Shadow Log Viewer dialog.

  • Even deleted shadow data is now logged. When records are removed from the shadow data log, the binary data is deleting from the database but the information about these records is written to a Deleted Shadow Data Log and can be conveniently viewed from the DeviceLock® Management Console.

  • A special log for DeviceLock® Enterprise Server writes its internal information, warnings and errors for convenient viewing from DeviceLock® Management Console.

  • A custom message can now be displayed when temporary access permission expires for devices that were authorized via Temporary White List.

  • Now all DeviceLock® components install via a single installation package - setup.exe. Using this package you can install DeviceLock® Service, DeviceLock® Enterprise Server, all management consoles, as well as documentation and help files. The setup_gp.exe packaged was removed.

  • The user manual and help-files have been significantly updated to include information about all new features and for easier reference overall.
 


Page 2 of 4

Did You Know

arrow Identity theft is the top consumer complaint in the USA according to the Federal Trade Commission.

arrow US consumers reported fraud loss totalling more than $1.1 billion in 2006.

arrow Credit card fraud (25%) was the most common form of reported identity theft in the US in 2006.

arrow More than 100 000 people are affected by identity theft each year in the UK

arrow According to Privacy Rights Clearinghouse, more than 350 data loss incidents involving more than 140 million records have occurred since February 2005

arrow Organisations are obliged by law to take take adequate steps to ensure the proper disposal of data


mxi-3devices0

Visitors

mod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_counter
Now: 2024-04-30 14:25

Who's Online

We have 366 guests online
You are here  :