Acronis
DeviceLock DLP

Stop data leaks at the source with complete endpoint data loss prevention (DLP)

Try now
No credit card required

Minimize data loss and increase efficiency of data protection

  • Supported solutions
    Microsoft RDS, Citrix XenDesktop, Citrix XenApp, VMware Horizon View, VMware Workstation, VMware Workstation Player, Oracle VM VirtualBox, Windows Virtual PC
  • Supported controls
    Context-aware and content-aware controls, logging, data shadowing and alerting for thorough DLP security over virtualized sessions
  • No leakage of corporate data
    IT retains complete control over virtual corporate environments on employees’ personal devices
  • Private data independency
    Employees maintain full control over the device platform, personal applications, and their private data

Comprehensive data loss prevention capabilities

  • Centralized management and deployment
    Unique

    Centralized management and deployment

    Ease the resource-consuming processes of deploying and managing an enterprise DLP solution. Acronis DeviceLock DLP offers a set of central management consoles based on an organization’s IT environment, along with the ability to manage and deploy natively through Group Policy.
  • Log collection

    Log collection

    Automatically collect audit and shadow logs and deliver them to the secure central repository to ease security investigations and auditing, thanks to Acronis DeviceLock DLP agents. Traffic shaping and data compression for log delivery and load-balancing help reduce network impact.
  • Alerting

    Alerting

    Shorten reaction times with real-time SMTP, SNMP, and SYSLOG alerts based on unauthorized actions delivered directly to SIEM systems and administrators.
  • Tamper protection

    Tamper protection

    Prevent tampering with DLP policy settings locally on protected endpoints, even by local sysadmins. When enabled, only designated Acronis DeviceLock DLP administrators using the central management console can uninstall, upgrade the agent, or modify DLP security policies.
  • Allowlisting

    Allowlisting

    Authorize the use of specific USB devices or provide a temporary access code for offline work purposes. Allowlist media storage devices and users that can access them. Specify allowlist-oriented controls over network communications based on protocol and network application properties.
  • Reporting

    Reporting

    Gain visibility over data flows, data protection, and user activities related to them with powerful built-in compliance-related reports based on audit and shadow logs, permissions and settings, connected plug-and-play devices, and user activities.
All features

What our customers say about Acronis DeviceLock DLP

  • A product like DeviceLock delivers high value for its intended purpose of port and device-level security. My experience with all-in-one solutions is that they do a bit of everything, but none of them very well. With DeviceLock we got features like integration with Microsoft’s Active Directory, so that we could structure deployment around existing groups. I installed it and had it working within a day. We’re always leveraging this interface when we set-up new users and change permissions. We’ve allowed certain IT Support staff the right to manage DeviceLock permission setting for various user groups; but, they cannot make global changes. DeviceLock allows us these conveniences and fine-tuning.

    Tim Mugherini
    Senior Manager of Network Infrastructure & Security
  • DeviceLock has been our chosen endpoint DLP security solution for years, but its compatibility with Lexar JumpDrive SAFE S3000 USB flash drives at both the encryption detection layer and unique device ID number layer with its granular whitelisting features really helps us with many levels of compliance as well as security. No other endpoint solution provides this flexibility of encryption integration.

    Christopher Long
    CISSP, Chief Security Officer
  • DeviceLock was the ideal product for us. I was primarily looking for a solution that required minimal supervision, allowing me to focus on managing our IT estate and supporting our asset managers. DeviceLock was simple to roll out and it was very competitive on cost. We have just renewed our contract and price is naturally an increasingly important consideration in the current environment. Until we purchased DeviceLock, our policy was to disable USB totally. With the advent of newer PCs with only USB mice and keyboards, this was clearly not a sustainable situation.

    Bruce Paterson
    IT Manager
  • Since 2005 the City of London Police have been successfully using Devicelock to manage device security across the enterprise. This has provided central access control for device management and audit control of information being transferred to and from the secure environment onto portable media. Robust monitoring has been developed using Devicelock and this provides me with a high degree of confidence in the security of our information.

    Gary Brailsford
    Verified Acronis user

Acronis DeviceLock DLP

72% of employees share sensitive information. Prevent any data leaks headed your way.

Controlled workloads and channels

  • Endpoints: Windows PC, Mac, Windows server
  • Virtual: Guest Windows machines on Microsoft RDS, Windows Virtual PC, Citrix XenDesktop, Citrix XenApp, Citrix XenServer, VMware Horizon View, VMware Workstation, VMware Workstation Player, Oracle VM VirtualBox
  • Local channels: ports, peripheral, storage, and redirected devices, connected mobile devices, clipboard
See full specs
Acronis
See full specs

Acronis DeviceLock DLP

Capture new market opportunities in the data loss prevention market with a trusted partner.

Looking for help?

Frequently asked questions

  • Can Acronis DeviceLock DLP function without internet connection?

    There are two different sets of DLP policies, Regular and Offline, which are automatically applied to a controlled endpoint by Acronis DeviceLock DLP agents depending on its network status. The Offline policy can be triggered by the laptop using either cached or confirmed Windows credential authentication, whether it can connect to any of its known Acronis DeviceLock Enterprise Servers, or if in a wired vs. unwired state.

  • Is Acronis DeviceLock DLP capable of “passive mode” functioning, i.e. not restricting data transfer, but logging and shadow copying?

    Yes, Acronis DeviceLock DLP is capable of functioning in any administrator set mode. We also call this “observation mode”.

    In cases where access to ports, devices, or network protocols is not blocked or content-filtered by policy, logging and data shadowing policy can be actively logging and keeping records in audit and shadow logs in “passive mode”.

    If there is a restrictive access policy active, Acronis’ DLP solution blocks the transfer and prevents data leakage on a controlled endpoint in real time.

  • Is there an option to configure various access control policies for laptops in- and out of the corporate network?

    Yes, there is. Acronis DeviceLock DLP supports various on- and off-corporate-line security policies. This way you can have one policy when the laptop is behind the firewall or DMZ and a totally different policy when the laptop is out in the wild, strengthening DLP security.

    Product help

    In case you have any difficulties, we have collected all the useful materials for this product in our FAQ and Documentation. Also you can always ask your question on our Discussion Boards.

    Technical support

    Customers with active product maintenance or subscription are entitled to 24/7 technical support. Follow the instructions at the Technical Support Site to get prompt support by phone, chat or e-mail.

    Sorry, your browser is not supported.

    It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.