Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Acronis DeviceLock DLP delivers an all-encompassing solution for endpoint data loss prevention (DLP), efficiently identifying and safeguarding sensitive information while overseeing activities related to that data. It mitigates risks of data breaches caused by employee errors or insider threats by preventing unauthorized access and transfers of sensitive information, including data at rest. This solution simplifies data protection processes and decreases reporting times by providing a unified DLP system that grants extensive insight into both user behavior and data movement. By establishing and enforcing mandatory data handling and usage policies, organizations can diminish information security vulnerabilities while ensuring adherence to IT security regulations and standards. Additionally, Acronis DeviceLock DLP streamlines the management of DLP strategies, allowing for easy deployment via Active Directory (AD) and featuring multiple centralized management options tailored to fit the specific needs of your organization. With its user-friendly interface, organizations can maintain control over their sensitive data while significantly enhancing their overall security posture.

Description

Netwrix Endpoint Protector is a comprehensive endpoint data loss prevention (DLP) and device control solution designed to protect sensitive data across all endpoints. It provides multi-OS support with full feature parity across Windows, macOS, and Linux environments. The platform monitors and controls data transfers across applications, devices, and network channels to prevent unauthorized data leakage. It includes granular device and port control, allowing organizations to manage USBs, printers, Bluetooth devices, and more. Netwrix Endpoint Protector also enforces encryption on removable media, ensuring sensitive data remains protected even if devices are lost or stolen. The solution features content-aware DLP capabilities that scan data in motion and at rest to detect and block sensitive information transfers. It includes endpoint discovery features to locate sensitive data stored on devices and reduce risk. The platform helps organizations comply with regulations such as GDPR, PCI-DSS, and ISO standards. It also protects against insider threats by monitoring user activity and enforcing security policies. With real-time monitoring and automated controls, it reduces the risk of data breaches. Overall, it provides strong endpoint security and centralized control over data usage.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Active Directory
Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
Netwrix Auditor
Siberson Veriket Data Classification

Integrations

Active Directory
Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
Netwrix Auditor
Siberson Veriket Data Classification

Pricing Details

$615 one-time payment
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Acronis

Founded

2003

Country

Singapore

Website

www.acronis.com/en-us/products/devicelock/

Vendor Details

Company Name

Netwrix

Founded

2006

Country

United States

Website

netwrix.com/en/products/endpoint-protector/

Product Features

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Product Features

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Alternatives

Alternatives

Trusted Knight Protector Endpoint Reviews

Trusted Knight Protector Endpoint

Trusted Knight Corporation