DeviceLock® 6.4 just released
Sunday, 19 April 2009 16:00
DeviceLock, Inc., a worldwide leader in endpoint device control, today announced the release of DeviceLock 6.4. With this release DeviceLock adds true file type detection and filtering – the first deep data analysis feature built atop its new content processing engine. DeviceLock 6.4 can intercept peripheral device read/write operations, perform analysis of the entire digital content in real-time and enforce applicable file-type-based security policies. This is just one more control that DeviceLock customers can establish to cost-effectively maintain complete management over the context of local communications on their corporate endpoints. In addition, true file types can now be used as a parameter for DeviceLock data shadowing policies, thus increasing the level of granularity and flexibility of controls.
“DeviceLock 6.4 with its new content processing engine is a big step forward," explains Ashot Oganesyan, DeviceLock Founder and CTO. "In contrast to alternate approaches, such as detecting file types using easy-to-forge file extensions or checking just a limited number of bytes from file headers, DeviceLock accurately identifies file types from their binary signatures by analyzing the entire set of data contained in the file. This method is not vulnerable to file encapsulation and other concealment techniques that defeat competitive approaches."
DeviceLock’s true file type detection and filtering capability currently detects around 3800 known file types and is extensible to add new types as requested by customers. It is also not limited to file filtering operations within just Windows Explorer. If permission for a given file type is set to ‘block’ for managed device types, no files of that type can be moved from a user’s computer to removable media, regardless of which application or process initiated the request.
Another new feature implemented in DeviceLock 6.4 is network-awareness support, with automatic policy mode switching. It is now possible to centrally define a separate set of permissions to be applied when a computer is disconnected from the corporate network. Such an off-line policy exists as a complement to the regular “online” policy. DeviceLock recognizes the network mode of the computer, and applies the correct policy automatically. Network-awareness support provides security administrators with one more dimension of flexibility by allowing them to take into account whether the user is working from the protected corporate network, or from a much less safe and predictable Internet environment.
DeviceLock 6.4 incorporates a number of additional enhancements including the ability to automatically generate graphical reports based on DeviceLock audit and shadow logs.
What's New in DeviceLock® 6.4 (versus 6.3):
- DeviceLock now supports "Content-Aware Rules" which provide a flexible method to enforce more granular security at the file level. This method allows you to selectively grant or deny access to certain file types, regardless of preset permissions at the device-level. You can also use "Content-Aware Rules" to allow or deny shadowing of certain file types. DeviceLock uses a content-based file type detection algorithm. Recognition and identification of file types is based on their characteristic signatures. This efficient and reliable algorithm allows for correct identification and handling of files regardless of the file extension. More than 3000 file types are supported.
- Added support for offline profiles. DeviceLock now allows you to define different online vs. offline security policies for the same user or set of users. A user's online policies are applied when connected to the corporate network, specified DeviceLock Enterprise Servers, or Active Directory domain controllers. Offline policies are applied when the user is working disconnected from the corporate network, specified DeviceLock Enterprise Servers or Active Directory domain controllers.
- Now you can make graphical reports based on the logs (audit and shadow) stored on DeviceLock Enterprise Server. These reports can be automatically sent to you via an e-mail.
- Now you can change audit log settings (maximum log size and Windows procedures in the event of full capacity) via Group Policies as for other DeviceLock's settings.
- Added integration with SafeDisk. DeviceLock detects encrypted SafeDisk disks (USB Flash Drives and other removable media) and applies special "encrypted" permissions to them. Using these "encrypted" permissions you can, for example, allow writing only to encrypted removable devices and deny writing to unencrypted media.
- Major improvements in the built-in DeviceLock Printer Viewer.
- Improved support for Live File System for CDs in the Media White List.
- Improved random DeviceLock Enterprise Server selection algorithm.
- Improved USB keylogger detection algorithm.
- Improved GUI.
- Many other internal improvements and bug fixes.
Existing customers that are still within their one-year free maintenance period can use this new version without any fee!