Skip to main content

Get your PC ports monitored

SmartLine launched the sixth version of its DeviceLock, a release that addresses the challenge of enforcing endpoint security policy and auditing activity for all plug-and-play ports, drives, and removable devices on computers equipped with Microsoft Windows XP operating systems.

Key features of DeviceLock 6 include data shadowing, additional white list capabilities and improved access control for CD and DVD burners.

The combination of its extensive, exclusive functionality and competitive pricing render DeviceLock 6 unique and the best value-for-money endpoint security software on the market.

Data shadowing allows system administrators to set DeviceLock 6 to monitor activity by mirroring all data copied to removable and floppy media and legay ports like serial (COM) and parallel (LPT).

It captures full copies of files that are copied to authorized removable devices, burned to CD/DVD or even printed by authorised end users.

The shadow copies are then available for further analysis of any compressed, encrypted, or mis-named files, revealing any breaches of the company’s data integrity policy.

DeviceLock 6 will also capture log information on the user, host computer, associated time stamps, and other pertinent data to isolate the source of any breach.

Now IT security officials can add this extra layer of monitoring to users with access to high-sensitivity data and establish one more deterrent to policy violators and ‘inside job’ perpetrators.

The additional support for the White List enables administrators to identify a specific DVD/CD-ROM disk by the data signature, authorizing access to it even when DeviceLock 6 has otherwise blocked the DVD/CD-ROM drive.

This is in addition to the already-extensive White List functionality. Temporary USB White List allows network managers to grant users temporary access to USB devices when there is no network connection.

Access codes are simply given over the phone. The function is particularly useful in supporting mobility and in exceptional situations, such as a remote worker having an exceptional need for USB access.

DeviceLock administrators can also ‘White List’ a single, unique device, while locking out all other devices of the same brand and model, as long as the device manufacturer has supplied a suitable unique identifier, such as a serial number.

Plus, devices in the USB White List can now be assigned to users and groups, allowing administrators more control over which users have access to what USB devices.

Exclusively, DeviceLock 6 enables a chief security officer or other super-administrator to control which local administrators are appointed DeviceLock administrators.

The feature enables the creation of a discrete list of those able to administer (install, uninstall, modify permissions and other settings, etc.) DeviceLock.

The network’s security is enhanced dramatically because even users with local administrator privileges cannot disable DeviceLock or remove it from their – or another’s – computer.

Désiré Athow

Désiré has been musing and writing about technology during a career spanning four decades. He dabbled in website building and web hosting when DHTML and frames were en vogue and started writing about the impact of technology on society just before the start of the Y2K hysteria at the turn of the last millennium. Following an eight-year stint at where he discovered the joys of global tech-fests, Désiré now heads up TechRadar Pro. Previously he was a freelance technology journalist at Incisive Media, Breakthrough Publishing and Vnunet, and Business Magazine. He also launched and hosted the first Tech Radio Show on Radio Plus.