數據庫‎ > ‎連通工具‎ > ‎


張貼者:2010年8月30日 晚上9:20未知的使用者   [ service orderble 已於 2012年8月8日 下午2:40 更新 ]
DeviceLock allows you to control users access to devices via Group Policy in an Active Directory domain

DeviceLock 是管理網絡設備的程序能給網絡管理員控制哪些用戶可以訪問哪些設備,提高准入控制的系統管理員,並幫助控制移動磁盤使用,它可以保護網絡和當地的電腦免受病毒,特洛伊木馬程序和其他惡意程式。

開發商: DeviceLock, Inc.

02-8231-5565 , service@orderble.com

  • 控制哪些用戶或組可以訪問 USB,火線,紅外線,COM和LPT端口; WiFi和藍牙適配器,任何類型的打印機,包括本地,網絡和虛擬打印機;視窗移動,黑莓,iPhone和Palm OS為基礎的PDA和智能手機,以及DVD / CD的光盤,軟盤驅動器和其他可移動和拆開的播放設備

  • 有選擇地授予或拒絕訪問某些真正的可移動媒體文件類型

  • 控制對設備的依賴於時間一天一天的一周

  • 界定哪些類型的數據(文件,日曆,電子郵件,任務,便箋等),允許企業之間同步個人電腦和個人移動設備

  • 定義不同的網上主場迎戰脫機安全政策相同的用戶或一組用戶

  • 檢測加密的PGP ®,DriveCrypt和TrueCrypt磁盤(USB閃存驅動器和其他可移動媒體)以及雷克沙®安全PSD和雷克沙JumpDrive外管局S3000 ®加密閃存驅動器和應用特殊的“加密”權限給他們

  • 僅授權特定的USB設備,不會被鎖定無論任何其他設置

  • 授予用戶臨時訪問 USB設備時,有沒有網絡連接(您為用戶提供的特殊接入碼在電話中要求獲得暫時釋放設備)

  • 唯一地標識一個特定的DVD / CD - ROM光盤的數據簽名和授權訪問它,甚至當 DeviceLock ®的以其他方式阻撓的DVD / CD - ROM驅動器

  • 防止用戶具有本地管理員特權,使他們無法禁用DeviceLock ®的服務或刪除它從他們的電腦,如果他們不在名單 DeviceLock ®的管理者

  • 在搜索文本陰影文件和審計日誌存儲在中央數據庫

  • 在設備設置只讀模式

  • 保護磁盤的格式由意外或故意

  • 硬件鍵盤記錄器檢測和阻斷(USB和PS / 2)

  • 部署的權限和設置通過組策略在Active Directory域

  • 使用標準的Windows的RSoP管理單元來查看DeviceLock ®的政策目前正在實施,以及預測什麼樣的政策將適用於在特定情況下

  • 使用遠程控制所有的集中管理控制台

  • 獲取完整的日誌港口和設備的活動,如上傳和下載用戶和文件名在Windows事件日誌的標準

  • 鏡子的所有數據(陰影)複製到外部存儲設備(移動,軟盤,DVD / CD - ROM上),Windows移動,iPhone或Palm OS的PDA和智能手機,通過 COM和LPT轉港口,甚至印

  • 數據存儲在一個集中的陰影組成部分,現有的服務器和任何現有的ODBC兼容的SQL基礎設施

  • 在遠程計算機監控實時檢查 DeviceLock ®的服務狀態(運行或不),政策的一致性和完整性

  • 生成一個報告的權限和設置已經設置

  • 基於圖形化的報告作出的日誌(審計和陰影)存儲在服務器上。

  • 生成一個報告顯示了USB,FireWire和PCMCIA設備當前連接到計算機和那些已連接

  • 創建一個自定義的MSI包DeviceLock ®的服務與預定義的政策。

    With DeviceLock® you can:

    • Control which users or groups can access USB, FireWire, Infrared, COM and LPT ports; WiFi and Bluetooth adapters; any type of printer, including local, network and virtual printers; Windows Mobile, BlackBerry, iPhone and Palm OS-based PDAs and smartphones; aswell as DVD/CD-ROMs, floppy drives, and other removable and Plug-and-Play devices

    • Selectively grant or deny access to certain true file types for removable media

    • Control access to devices depending on the time of day and day of the week

    • Define which types of data (files, calendars, emails, tasks, notes, etc.) are allowed to synchronize between corporate PCs and personal mobile devices

    • Define different online vs. offline security policies for the same user or set of users

    • Detect encrypted PGP®, DriveCrypt and TrueCrypt disks (USB Flash Drives and other removable media) as well as Lexar® SAFE PSD and Lexar® JumpDrive SAFE S3000 encrypted flash drives and apply special "encrypted" permissions to them

    • Authorize only specific USB devices that will not be locked regardless of any other settings

    • Grant users temporary access to USB devices when there is no network connection (you provide users with the special access codes over the phone that temporarily unlock access to requested devices)

    • Uniquely identify a specific DVD/CD-ROM disk by the data signature and authorize access to it, even when DeviceLock® has otherwise blocked the DVD/CD-ROM drive

    • Protect against users with local administrator privileges so they can't disable DeviceLock® Service or remove it from their computers, if they are not in the list of DeviceLock® administrators

    • Search of text across shadowed files and audit logs stored in the centralized database

    • Set devices in read-only mode

    • Protect disks from accidental or intentional formatting

    • Detect and block hardware keyloggers (USB and PS/2)

    • Deploy permissions and settings via Group Policy in an Active Directory domain

    • Use the standard Windows RSoP snap-in to view the DeviceLock® policy currently being applied, as well as to predict what policy would be applied in a given situation

    • Control everything remotely using the centralized management console

    • Get a complete log of port and device activity, such as uploads and downloads by users and filenames in the standard Windows Event Log

    • Mirror all data (shadowing) copied to external storage devices (removable, floppy, DVD/CD-ROM), Windows Mobile, iPhone or Palm OS PDAs and smartphones, transferred via COM and LPT ports and even printed

    • Store shadow data on a centralized component of an existing server and any existing ODBC-compliant SQL infrastructure

    • Monitor remote computers in real-time, checking DeviceLock® Service status (running or not), policy consistency and integrity

    • Generate a report concerning the permissions and settings that have been set

    • Make graphical reports based on the logs (audit and shadow) stored on the server.

    • Generate a report displaying the USB, FireWire and PCMCIA devices currently connected to computers and those that were connected

    • Create a custom MSI package for DeviceLock® Service with predefined policies.