Control which users or groups can access USB, FireWire, Infrared, COM and LPT ports; WiFi and Bluetooth adapters; any type of printer, including local, network and virtual printers; Windows Mobile, BlackBerry, iPhone and Palm OS-based PDAs and smartphones; aswell as DVD/CD-ROMs, floppy drives, and other removable and Plug-and-Play devices
Selectively grant or deny access to certain true file types for removable media
Control access to devices depending on the time of day and day of the week
Define which types of data (files, calendars, emails, tasks, notes, etc.) are allowed to synchronize between corporate PCs and personal mobile devices
Define different online vs. offline security policies for the same user or set of users
Detect encrypted PGP®, DriveCrypt and TrueCrypt disks (USB Flash Drives and other removable media) as well as Lexar® SAFE PSD and Lexar® JumpDrive SAFE S3000 encrypted flash drives and apply special "encrypted" permissions to them
Authorize only specific USB devices that will not be locked regardless of any other settings
Grant users temporary access to USB devices when there is no network connection (you provide users with the special access codes over the phone that temporarily unlock access to requested devices)
Uniquely identify a specific DVD/CD-ROM disk by the data signature and authorize access to it, even when DeviceLock® has otherwise blocked the DVD/CD-ROM drive
Protect against users with local administrator privileges so they can't disable DeviceLock® Service or remove it from their computers, if they are not in the list of DeviceLock® administrators
Search of text across shadowed files and audit logs stored in the centralized database
Set devices in read-only mode
Protect disks from accidental or intentional formatting
Detect and block hardware keyloggers (USB and PS/2)
Deploy permissions and settings via Group Policy in an Active Directory domain
Use the standard Windows RSoP snap-in to view the DeviceLock® policy currently being applied, as well as to predict what policy would be applied in a given situation
Control everything remotely using the centralized management console
Get a complete log of port and device activity, such as uploads and downloads by users and filenames in the standard Windows Event Log
Mirror all data (shadowing) copied to external storage devices (removable, floppy, DVD/CD-ROM), Windows Mobile, iPhone or Palm OS PDAs and smartphones, transferred via COM and LPT ports and even printed
Store shadow data on a centralized component of an existing server and any existing ODBC-compliant SQL infrastructure
Monitor remote computers in real-time, checking DeviceLock® Service status (running or not), policy consistency and integrity
Generate a report concerning the permissions and settings that have been set
Make graphical reports based on the logs (audit and shadow) stored on the server.
Generate a report displaying the USB, FireWire and PCMCIA devices currently connected to computers and those that were connected
Create a custom MSI package for DeviceLock® Service with predefined policies.