DriveLock Agent Download



Downloading DriveLock Agent 7.1

Implementing new security policies often impedes productivity as users can no longer perform some familiar tasks and have to change the way they perform others. The challenge for IT departments is to find a balance between maximizing security and preserving the continuity of business processes.

Data security made easy — It takes just a few steps to significantly increase the security of your corporate data and to eliminate the dangers from uncontrolled use of USB and other ports. With DriveLock you can put an end to the use of unapproved devices. To keep your information secure in transit, DriveLock can encrypt the data on internal and external drives and other storage devices. This includes hard drives, USB flash drives, SD media, eSATA drives and even CDs and DVDs you burn.

Encryption can be enforced if your corporate policies require that all data on portable storage devices must be secured. Administrators have access to simple-to-use helpdesk tools to quickly and securely restore access to a device if someone forgets a password. No knowledge or transmission of a central password is required to generate a one-time passcode that restores access.
DriveLock is a leading solution for controlling your endpoints. It can protect desktop computers and laptop computers, but also virtual desktops and thin clients. In addition to comprehensive port control, DriveLock offers extensive encryption options and comprehensive application control - all of this is configured and administered centrally using a single management console that is available in multiple languages. And because DriveLock's architecture is so straightforward, it is successfully used worldwide to protect small networks as well as large enterprises. DriveLock offers dynamic access control for drives (floppy disks, CD-ROMs, USB flash drives, etc.) and also controls all other device types, such as Bluetooth, Palm, Windows Mobile, BlackBerry, and other smart phones. Using whitelist rules (based on device type and hardware ID), you can specify exactly who can use which device at what time. You can even create detailed rules for the use of removable drives based on the drive's manufacturer, model and unique serial number to achieve granular definition and implementation of access rules. Other features let you enable access to specific authorized media, set time limits and create exceptions for certain users, groups, computers and networks. These are just a few of the customization options that are available to let you enforce the exact device usage policies you require. To give a user temporary access to a blocked device, you can use temporary unlocking, even when the computer is offline and not connected to your network.
DriveLock policies are very easy to configure, and distribution of the policy settings to client computers is just as easy. Because of DriveLock's integration with Active Directory Group Policy, no separate infrastructure or servers are required to apply policy changes to clients. If Active Directory is not available (for example in Novell networks), you can instead distribute policies to a single computer or an entire network by using configuration files. To help create a stress-free implementation phase, DriveLock includes a Simulation Mode, which lets you test all policy settings without impeding user productivity because of configuration errors or unanticipated effects of policy enforcement. The built-in Agent self protection lets you decide whether you want complete protection against any tampering with the DriveLock Agent or whether administrators and helpdesk personnel are allowed to disable the Agent for troubleshooting. At every step along the way, you will experience DriveLock's "simple but secure" philosophy.

To start download, click the following link:



Report Link Error | Back to DriveLock Agent Details page



Popular software of Internet, Monitoring