DriveLock Windows

 

Dynamic and safe

DriveLock offers a comprehensive dynamic configurable access to drives like CD-ROMs, USB-Sticks etc. and controls all other devices for example Palms, Windows Phones, BlackBerry and Smartphones. 
Through the configuration of whitelist rules (based on devices and hardware ID‘s) it can be specified which device can be used at which time by which user. Access to external drives can be controlled through the manufacturer serial number, product number or hardware ID. This allows the exact definition for individual access. Further attributes allow the unblocking of authorized devices, the setting of time limitations, restrictions for certain groups for example users, computers, networks and many more configuration possibilities. 

 

Safety in networks

Application control can be temporarily turned off in DriveLock when necessary, even when the computer is offline or not connected to a network.

On the basis of a definable network profile, the current network connection will be automatically recognized and the DriveLock configuration will be automatically adapted. Therefore connection with WLAN devices within your company can be blocked (avoid network bridging) or connection to unknown networks can be avoided completely. Of course it is possible to block for example the use of Skype within the company network the same way, but to allow the use for employees on business trips.

 

Most complete and effective security ever

In the Premium Edition there are high end application controls integrated to protect from Zero-Day-Exploits and up to now unknown Trojan viruses or industrial spying and stealing data. The possibilities lie far above the basic protection offered by Windows 8 and offer much more flexibility. It is possible to enable different options to fufill different security criteria which can be combined in various configurations, allowing you to block or allow applications and devices. Therefore only a few rules are necessary to achieve complete protection unlike any other solutions on the market.
There are different DriveLock Editions available, that differ with regard to the features. The following overview shows the different features in the individual editions.

 

Product list

Function

Standard

Edition

Premium

Edition

Executive

Edition

Control of data storage medium, removable media and flow of data

Blocking all types of drives (Floppy, CD/DVD, USB, Firewire and others) 

Blocking of devices (Smartphones, MP3-Player, Cameras etc.)

Define a list of authorized devices

Data filtering

Definition of specified file types

Tracing of file transfer

Create volume shadow medium

Intelligent administration

Creation of computer templates

-

Automatic scripts when drives are attached

Configuration depending on current network connection

Comprehensive reporting

Database centrally stored with SQL

Creation of reports for management and weak –point security analysis

Analysis of incidents (grouping, filtering, sorting)

Reports and graphs can be printed

Data collected can be exported

Application control

Application execution control

Blocking of applications (blacklist)

Unblocking of allowed applications (whitelist)

Combination of blacklist and whitelist for optimal configuration

Full disk encryption

Encryption of all local hard disks and system partitions

FIPS140-2 (US government computer security standard) certified algorithm

Pre-boot authentication and single sign-on (SSO)

Efficient recovery tools for data recovery of damaged hard disks and support for emergency logon in case of forgotten password

Support for smartcards and tokens

Function

Standard

Edition

Control of data storage medium, removable media and flow of data

Blocking all types of drives (Floppy, CD/DVD, USB, Firewire and others) 

Blocking of devices (Smartphones, cameras, MP3-Player, etc.)

Define a list of authorized devices

Data filtering

Definition of specified file types

Tracing to file transfer

Create volume shadow medium

Intelligent administration

Creation of computer templates

Automatic scripts when drives are attached

Configuration depending on current network connection

Comprehensive reporting

Database centrally stored with SQL

Creation of reports for management and weak –point security analysis

Analysis of incidents (grouping, filtering, sorting)

Reports and graphs can be printed

Data collected can be exported

Application control

Application execution control

Blocking of applications (blacklist)

Unblocking of allowed applications (whitelist)

Combination of blacklist and whitelist for optimal configuration

Full disk encryption

Encryption of all local hard disks and system partitions

FIPS140-2 (US government computer security standard) certified algorithm

Pre-boot authentication and single sign-on (SSO)

Efficient recovery tools for data recovery of damaged hard disks and support for emergency logon in case of forgotten password

Support for smartcards and tokens

Function

Premium

Edition

Control of data sotrage medium, removable media and flow of data

Blocking all types of drives (Floppy, CD/DVD, USB, Firewire and others) 

Blocking of devices (Smartphones, cameras, MP3-Player etc.)

Define a list of authorized devices

Data filtering

Definition of specified file types

Tracing of file transfer

Create volume shadow medium

Intelligent administration

Creation of computer templates

Automatic scripts when drives are attached

Configuration depending on current network connection

Comprehensive reporting

Database centrally stored with SQL

Creation of reports for Management and weak-point security analysis

Analysis of incidents (grouping, filtering, sorting)

Reports and graphs can be printed

Data collected can be exported

Application control

Application execution control

Blocking of applications (blacklist)

Unblocking of allowed applications (whitelist)

Combination of blacklist and whitelist for optimal configuration

Full disk encryption

Encryption of all local hard disks and system partitions

FIPS140-2 (US government computer security standard) certified algorithm

Pre-boot authentication and single sign-on (SSO)

Efficient recovery tools for data recovery of damaged hard disks and support for emergency logon in case of forgotten password

Support of smartcards and tokens

Function

Executive

Edition

Control of data storage medium, removable media and flow of data

Blocking all types of devices (Floppy, CD/DVD, USB, Firewire and others) 

Blocking of devices (Smartphones, cameras, MP3-Player etc.)

Define a list of authorized devices

Data filtering

Definition of specified file types

Tracing of file transfer

Create volume shadow medium

Intelligent administration

Creation of computer templates

Automatic skripts when drives are attached

Configuration depending on current network connection

Comprehensive reporting

Database centrally stored with SQL

Creation of reports for management and weak-point security analysis

Analysis of incidents (grouping, filtering, sorting)

Reports and graphs can be printed

Data collected can be exported

Application control

Application execution control

Blocking of applications (blacklist)

Unblocking of allowed applications (whitelist)

Combination of blacklist and whitelist for optimal configuration

Full disk encryption

Encryption of all local hard disks and system partitions

FIPS140-2 (US government computer security standard) certified algorithm

Pre-boot authentification and single sign-on (SSO)

Efficient recovery tools for data recovery of damaged hard disks and support for emergency logon in case of forgotten password

Support of smartcards and tokens

Screenshots

DriveLock Suite 

The DriveLock Suite offers additional functionalities to the DriveLock Edition and protects your data through Encryption.

Overview of the features

  • Encryption of data using industry standard algorithms (i.e. AES, 3DES) 
  • FIPS 140-2 (US government computer security standard) certified algorithm available
  • Automatic and transparent encryption of data to external drives
  • Mobile encryption application: Encryption of files on computers without DriveLock installed or without administrator rights
  • Secure deletion of data (i.e. individual files, folders or complete external drives)
  • Secure recovery of containers with lost password (online and offline)

DriveLock Executive Suite

The Executive Suite additionally offers all features of DriveLock Full Disk Encryption.

  • Encryption of all local hard disks and system partitions
  • FIPS140-2 (US government computer security standard) certified
  • Pre-boot authentication and single sign-on (SSO) 
  • Efficient recovery tools for data recovery of damaged hard disks and support for emergency logon in case of forgotten password

DriveLock Suite

Function

Standard

Suite

Premium

Suite

Executive

Suite

Control of data storage medium, removable media and flow of data

Blocking all types of drives (Floppy, CD/DVD, USB, Firewire and others) 

Blocking of devices (Smartphones, cameras, MP3-Player etc.)

Define a list of authorized devices

Data filtering

Definition of specified file types

Tracing of file transfer

Create volume shadow medium

Intelligent administration

Creation of computer templates

-

Automatic scripts when drives are attached

Configuration depending on current network connection

Comprehensive reporting

Database centrally stored with SQL

Creation of reports for management and weak-point security analysis

Analysis of incidents (grouping, filtering, sorting)

Reports and graphics can be printed

Data collected can be exported

Application control

Application execution control

Blocking of applications (blacklist)

Unblocking of allowed applications (whitelist)

Combination of backlist and whitelist for optimal configuration

Removable media encryption

Automatically and transparently encrypt removable media

Enforced encryption

Secure password recovery

Wizard for creating encrypted CDs and DVDs

Encryption of Windows mobile

Access encrypted media without installing Software or needing local administrative rights

Securely delete data

Full disk encryption

Encryption of all local hard disk and system partitions

FIPS140-2 (US government computer security standard) certified algorithm

Pre-boot authentication and single sign-on (SSO)

Efficient recovery tools for data recovery of damaged hard disks and support for emergency logon in case of forgotten password

Support for smartcard and tokens

Function

Standard

Suite

Control of data storage medium, removal media and flow of data

Blocking all types of drives (Floppy, CD/DVD, USB, Firewire and others)

Blocking of devices (Smartphones, MP3-Player, Cameras etc.)

Define a list of authorized devices

Data filtering

Definition of specified file types

Tracing of file transfer

Create volume shadow medium

Intelligent administration

Creation of computer templates

Automatic scripts when drives are attached

Configuration depending on current network connection

Comprehensive reporting

Database centrally stored with SQL

Creation of reports for management and weak-point security analysis

Analysis of incidents (grouping, filtering, sorting)

Reports and graphs can be printed

Data collected can be exported

Application control

Application execution control

Blocking of applications (blacklist)

Unblocking of allowed applications (whitelist)

Combination of blacklist and whitelist for optimal configuration

Removable media encryption

Automatically and transparently encrypt removable media

Enforced encryption

Secure password recovery

Wizard for creating encrypted CDs and DVDs

Encryption for Windows mobile

Access encrypted media without installing software or needing local administrative rights

Securely delete data

Full disk encryption

Encryption of all local hard disks and system partitions

FIPS140-2 (US government computer security standard) certified algorithm

Pre-boot authentication and single sign-on (SSO)

Efficient recovery tools for data recovery of damaged hard disks and support for emergency logon in case of forgotten password

Support for smartcards and tokens

Function

Premium

Suite

Control of data storage medium, removal media and flow of data

Blocking all types of devices (Floppy, CD/DVD, USB, Firewire and others)

Blocking of devices (Smartphones, MP3-Player, Cameras etc.)

Define a list of authorized devices

Data filtering

Definition of specified file types

Tracing of file transfer

Create volume shadow medium

Intelligent administration

Creation of computer templates

Automatic scripts when drives are attached

Configuration depending on current network connection

Comprehensive reporting

Database centrally stored with SQL

Creation of reports for management and weak-point security analysis

Analysis of incidents (grouping, filtering, sorting)

Reports and graphs can be printed

Data collected can be exported

Application control

Application execution control

Blocking of applications (blacklist)

Unblocking of allowed applications (whitelist)

Combination of blacklist and whitelist for optimal configuration

Removable media encryption

Automatically and transparently encrypt removable media

Enforced encryption

Secure password recovery

Wizard for creating encrypted CDs and DVDs

Encryption for Windows mobile

Access encrypted media without installing software or needing local administrative rights

Securely delete data

Full disk encryption

Encryption of all local hard disks and system partitions

FIPS140-2 (US government computer security standard) certified algorithm

Pre-boot authentication and single sign-on (SSO)

Efficient recovery tools for data recovery of damaged hard disks and support for emergency logon in case of forgotten password

Support for smartcards and tokens

Function

Executive

Suite

Control of data storage medium, removal media and flow of data

Blocking all types of devices (Floppy, CD/DVD, USB, Firewire and others)

Blocking of devices (Smartphones, MP3-Player, Cameras etc.)

Define a list of authorized devices

Data filtering

Definition of specified file types

Tracing of file transfer

Create volume shadow medium

Intelligent administration

Creation of computer templates

Automatic scripts when drives are attached

Configuration depending on current network connection

Comprehensive reporting

Database centrally stored with SQL

Creation of reports for management and weak-point security analysis

Analysis of incidents (grouping, filtering, sorting)

Reports and graphs can be printed

Data collected can be exported

Application control

Application execution control

Blocking of applications (blacklist)

Unblocking of allowed applications (whitelist)

Combination of blacklist and whitelist for optimal configuration

Removable media encryption

Automatically and transparently encrypt removable media

Enforced encryption

Securely password recovery

Wizard for creating encrypted CDs and DVDs

Encryption for Windows mobile

Access encrypted media without installing software or needing local administrative rights

Securely delete data

Full disk encryption

Encryption of all local hard disks and system partitions

FIPS140-2 (US government computer security standard) certified algorithm

Pre-boot authentication and single sign-on (SSO)

Efficient recovery tools for data recovery of damaged hard disks and support for emergency logon in case of forgotten password

Support for smartcards and tokens

 

Address

CenterTools Software GmbH
St. Johns Innovation Centre
Cowley Road
Cambridge \\ CB4 0WS \\ UK


Phone

+44 (0) 1223 655 236


E-Mail

sales@centertools.com

Any Questions on your part?