DriveLock Agent 7.1
Download

DriveLock Agent 7.1

DriveLock is a leading solution for controlling your endpoints
Rating
Your vote:
Latest version:
7.1.7 See all
Screenshots
1 / 4
Download

Implementing new security policies often impedes productivity as users can no longer perform some familiar tasks and have to change the way they perform others. The challenge for IT departments is to find a balance between maximizing security and preserving the continuity of business processes.

Data security made easy — It takes just a few steps to significantly increase the security of your corporate data and to eliminate the dangers from uncontrolled use of USB and other ports. With DriveLock you can put an end to the use of unapproved devices. To keep your information secure in transit, DriveLock can encrypt the data on internal and external drives and other storage devices. This includes hard drives, USB flash drives, SD media, eSATA drives and even CDs and DVDs you burn. Encryption can be enforced if your corporate policies require that all data on portable storage devices must be secured. Administrators have access to simple-to-use helpdesk tools to quickly and securely restore access to a device if someone forgets a password. No knowledge or transmission of a central password is required to generate a one-time passcode that restores access.

DriveLock is a leading solution for controlling your endpoints. It can protect desktop computers and laptop computers, but also virtual desktops and thin clients. In addition to comprehensive port control, DriveLock offers extensive encryption options and comprehensive application control - all of this is configured and administered centrally using a single management console that is available in multiple languages. And because DriveLock's architecture is so straightforward, it is successfully used worldwide to protect small networks as well as large enterprises.

Because of DriveLock's integration with Active Directory Group Policy, no separate infrastructure or servers are required to apply policy changes to clients. If Active Directory is not available (for example in Novell networks), you can instead distribute policies to a single computer or an entire network by using configuration files. DriveLock doesn't force you to adjust the way you work to the tools you're using. Instead, you can customize DriveLock to make it work according to your needs.

The modern-looking and intuitive DriveLock Console is implemented as an MMC snapin. Experienced IT administrators will immediately feel at home and can take advantage of the flexible configuration options. You can easily adjust the management console to your preferences and experience level.

Choose the classic MMC mode or the taskpad mode, which provides additional information about the available configuration choices. To help you get started with DriveLock, there's also a Starter Mode that assists you with the initial configuration steps. Once you're proficient, you can turn off this mode and get access to all configuration settings.

DriveLock can help you increase security awareness among your staff. For example, you can configure DriveLock to let users access to removable devices only after they have reviewed your corporate policy and have indicated that they will comply with it. Of course you can audit and document which users have signaled accepted. You can even make device access dependent on a password that you only provide to users who have attended a security training class. Instead of placing the burden of security on your IT department, you can incorporate your entire staff and DriveLock into your forward-looking security strategy.

Comments

User

Your vote: