Welcome!

Cognitive Computing Authors: Liz McMillan, Pat Romanski, Elizabeth White, Yeshim Deniz, Karthick Viswanathan

News Feed Item

DeviceLock(R) Endpoint DLP Software Achieves Citrix Ready Certification

DeviceLock Data Leak Prevention Software Is Now Certified to Provide DLP Protection to Citrix XenApp-Based Virtual Endpoint Environments

SAN RAMON, CA -- (Marketwire) -- 11/15/12 -- DeviceLock, Inc., a worldwide leader in endpoint data leak prevention (DLP) software, today announced that their DeviceLock Endpoint DLP Suite has been verified as Citrix Ready. XenApp users can now protect their virtual endpoints with the leader in endpoint DLP software.

Citrix Ready is an end-to-end partner program from Citrix (NASDAQ: CTXS) that showcases and recommends products demonstrating compatibility with the Citrix Application Delivery Infrastructure. The program allows users to quickly and easily find solutions recommended by Citrix that are trusted to enhance Citrix offerings. Customers can be confident that the DeviceLock Endpoint DLP Suite has passed verification tests designed by Citrix and can be trusted to work in Citrix XenApp environments. These environments would include those deploying a 'Bring Your Own Device' (BYOD) model that provides employees secure access to corporate applications and data while using virtually any type of remote personal computer, laptop, tablet or smartphone device connected via the Citrix Receiver 'app.'

With its Virtual DLP feature, DeviceLock enforces flexible contextual and content-aware filtering controls over data flows between server-hosted virtual applications or desktops and redirected peripheral devices of remote BYOD endpoints. In addition, user network communications from within the terminal session are controlled by the DeviceLock DLP mechanisms. As a result, the isolated corporate environment on the employee's personal device remains under corporate control, as are all data exchanges between the user's virtual workspace and their personal device, local peripherals and the network.

"We are pleased to be able to offer Citrix customers the high level of endpoint protection which DeviceLock DLP Suite has long provided to the physical desktop," said Vince Schiavo, Chief Executive Officer, DeviceLock. "This Citrix Ready verification clearly demonstrates our strategy to provide comprehensive data leak prevention for our customers moving to virtualized endpoints, both at the application and desktop level."

DeviceLock 7.2 provides advanced content-aware controls over endpoint data leakage channels from a company's computers -- whether they are laptops, desktops, servers, and now even virtualized endpoints. The Endpoint DLP Suite consists of three software modules -- DeviceLock, NetworkLock and ContentLock -- that together protect any sized organization from endpoint data leak threats across the widest array of threat vectors. These include:

  • Transferring sensitive company data via endpoint-connected iPhones, Androids, BlackBerry, other smart-phones, iPods, iPads, digital cameras, CD/DVD ROM, USB drives, SD, Compact Flash and other forms of removable media
  • Transferring company data to cloud-based file sharing solutions such as Dropbox, GoogleDrive, SkyDrive, RapidShare and iFolder
  • Leaking company info from endpoints via social media, Skype, IM, webmail, email or printing
  • Data leakage from endpoints via FTP/FTPS, HTTP/HTTPS, and other protocols

"Our mission is to make the DeviceLock Endpoint DLP Suite the most easily deployed, integrated, scalable and flexible software available on the market for organizations that must protect confidential data from leaking out of their employees' computers -- whether physical or virtual," said Mr. Schiavo. "Earning the Citrix Ready certification truly speaks to our company's dedication to make our endpoint DLP software the very best in its category."

For more information on the DeviceLock Endpoint DLP Suite and to read the product review in its entirety, please visit www.devicelock.com/products/byod-virtual-dlp.html.

About DeviceLock, Inc.
Deployed on over 4 million devices by over 66,000 customers, DeviceLock stops data leaks at the source. DeviceLock software provides endpoint device/port control for data leak prevention (DLP) in situations where employees are using mobile devices like smart-phones, tablets, cameras or USB sticks along with company-owned endpoints like laptops or desktops. In addition, DeviceLock software can prevent data leaks via Internet and cloud-based pathways such as: Twitter, Facebook, Google+, Tumblr, Skype, Dropbox and many others.

DeviceLock, Inc. has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. Based in San Ramon, California, DeviceLock, Inc. is an international organization with offices in California, Washington, DC, London, Düsseldorf, Moscow and Milan.

COPYRIGHT ©2012 DeviceLock, Inc. All rights reserved. DeviceLock®, ContentLock, NetworkLock, and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. For more information, visit DeviceLock web-site at www.devicelock.com.

Add to Digg Bookmark with del.icio.us Add to Newsvine

DEVICELOCK MEDIA CONTACT

Dan Chmielewski
Madison Alexander PR, Inc.
P: 714/832-8716
C: 949/231-2965
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
"The Striim platform is a full end-to-end streaming integration and analytics platform that is middleware that covers a lot of different use cases," explained Steve Wilkes, Founder and CTO at Striim, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.