DeviceLock, Inc., a worldwide leader in endpoint data leak prevention software solutions, today announced that the iPhone® local synchronization filtering technology built into DeviceLock 6.4.1 controls local data transfers between Apple’s new iPad® and DeviceLock-protected endpoint computers.
DeviceLock customers are able to define and enforce permissions for this new much-touted tablet computer with the same high degree of flexibility and granularity already applied to iPhone® and iPod® touch mobile devices, as well as other types of smartphones, PDAs, and removable storage gadgets.
“DeviceLock customers already have the enforcement technology in place to protect themselves from users locally copying sensitive data from a Windows endpoint to an iPad and from the loss of control over that data should the iPad user then store or send it to destinations that are even further outside the protected confines of the corporate network,” said Ashot Oganesyan, DeviceLock CTO and Founder. “The iPad is positioned now as a digital book reader, video player, and gaming platform. But, with its bigger screen, keyboard, and a well-funded application development community, iPad buyers are certainly equipped to not just consume content, but to create content¾and for knowledge workers that means to work. However, before the ‘bring-your-iPad-to-work’ trend gathers steam, the IT security impacts need to be taken into consideration and policy set with regard to iPad use. DeviceLock can easily be configured to enforce accepted-use policies for local data communications with iPad by using the 'iPhone'-related configuration controls in any DeviceLock v6.4.1 administration console. It delivers an unprecedented level of completeness and quality of local synchronization control.”
DeviceLock’s patent-pending local synchronization filtering technology gives security administrators the ability to centrally control which types of data specified users or their groups are allowed to synchronize between corporate computers and locally connected iPads, iPhones and iPods. DeviceLock also can recognize and filter numerous data object types for the iTunes® protocol, thus empowering administrators to selectively allow or block synchronization of files, email accounts, contacts, tasks, notes, calendar items, bookmarks, and various media types.
DeviceLock provides scalable, centralized, and easy-to-learn management and administration via a customized Microsoft Management Console (MMC) snap-in that natively integrates with Group Policy Object Editor in Microsoft Active Directory. DeviceLock agents can be deployed, managed and administered completely from within an existing Microsoft Active Directory domain. A separate component, the DeviceLock Enterprise Server (DLES), is available for centrally auto-collecting audit and shadow data from protected endpoints. Highly-granular event logging and data shadowing configurations are supported for tracking and analyzing user actions on peripheral ports/devices, related system events and data transferred to peripheral devices.
In addition, DLES can monitor remote DeviceLock-managed computers in real-time to check on agent status and policy template consistency. DeviceLock’s comprehensive mix of configurable policy parameters and options facilitates the definition and enforcement of a “least privilege” corporate IT security policy. With DeviceLock, IT security administrators are equipped to logically profile the business role of every employee, group or department with regard to their use of local PC ports and peripheral devices, keeping each to the minimal set of operations required to perform their role. This reduces the overall risk of data leaks and helps organizations to better comply with applicable IT security regulations and industry standards.