<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DeviceLock &#8211; BEDRIFTSYSTEMER AS</title>
	<atom:link href="https://insec.no/product-brand/devicelock/feed/" rel="self" type="application/rss+xml" />
	<link>https://insec.no</link>
	<description>Secure Storage Solutions</description>
	<lastBuildDate>Fri, 15 Oct 2021 19:44:37 +0000</lastBuildDate>
	<language>nb-NO</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.3.11</generator>

<image>
	<url>https://insec.no/wp-content/uploads/2016/10/cropped-BedriftsystemerLogoIcon2-32x32.png</url>
	<title>DeviceLock &#8211; BEDRIFTSYSTEMER AS</title>
	<link>https://insec.no</link>
	<width>32</width>
	<height>32</height>
</image> 
                                          	<item>
		<title>DATALOCKER K350 FIPS Edition</title>
		<link>https://insec.no/produkt/datalocker-k350/</link>
				<pubDate>Fri, 15 Oct 2021 19:11:49 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
		
		<guid isPermaLink="false">https://insec.no/?post_type=product&#038;p=2650</guid>
				<description><![CDATA[The K350 is a password protected, FIPS 140-2 Level 3 certified, encrypted USB drive featuring a screen that streamlines setup and operation. If the K350 is centrally managed, additional layers of organizational control strengthen the portable storage security posture further. Meet the strictest requirements and work with ease anywhere there is USB mass storage. The K350 is the slim and strong addition to DataLocker’s complete portfolio of securely managed solutions, plus it’s backed by a limited 3-year warranty.]]></description>
								<content:encoded><![CDATA[<h2 class="mb-5 text-center">K350 BENEFITS</h2>
<h3>Powerful Encryption Right Out of the Box</h3>
<p>Everything you need to encrypt data is built into the FIPS 140-2 Level 3 (<a href="https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4008">#4008</a>) and Common Criteria certified (pending*) K350. No drivers. No setup. Just iron-clad, hardware-based AES 256-bit encryption in an easy-to-use interface, which is further guarded by an army of automated security policies.</p>
<h3>Protect Data at Scale</h3>
<p>Remote management available with SafeConsole®, lets admins fully control or terminate devices over the Internet. Rapid, no-hands, automated deployment at scale is available for both managed and unmanaged K350 drives using the DeviceDeployer tool.</p>
<h3>Ensure User Adoption With Easy-to-Use Keypad</h3>
<p>The on board screen streamlines setup and operation making it easier to operate than any keypad device on the market. The screen gives end-users quick access to secure data and allows them to customize device settings. On-screen instructions make setup fast and easy.</p>
<h3>Remotely Manage and Audit Your Entire Fleet</h3>
<p>All K350 drives are remotely manageable with SafeConsole, giving admins the ability to remotely lock or wipe drives, reset passwords, view last-used locations, and see what data has been added, removed, or changed on the drive. Set device or group-specific policies for all the drives in your fleet.</p>
<h2 class="mb-5 text-center">K350 FEATURES</h2>
<p><strong>FIPS 140-2 Level 3 Certification</strong> – FIPS 140-2 level 3 certification and pending Common Criteria EAL5+ certification. Provides always-on hardware based encryption. Dedicated AES 256-bit XTS mode crypto engine meets rigorous cryptographic standards and is more secure than software-based alternatives. Hardened internals and enclosure for increased physical security.</p>
<p><strong>Admin Policies and Data Recovery</strong> – Admins can set rigorous password policies (non sequential, non-repeating special characters, minimum characters). Should users forget a password, admins can unlock the K350 using the admin password. Admins can also recover the user’s data by logging in with the admin password. The user will be forced to reset their password upon their next use.</p>
<p><strong>Nothing to Install</strong> – All encryption, administration, and authentication is performed on the K350 unit. This means devices in standalone mode don’t require a software agent; they work right out of the box.</p>
<p><strong>Fully Manageable Device</strong> – Use DataLocker SafeConsole to manage individual and groups of devices using automated policies.</p>
<p><strong>Brute Force Password Protection</strong> – Admins can configure how many failed password attempts are needed before the device destroys its payload.</p>
<h2 class="mb-5 text-center">K350 MANAGED FEATURES</h2>
<p><strong>Remote Device Detonation</strong> – Lets admins functionally destroy the device and its data remotely to protect against data or encryption key theft.</p>
<p><strong>On Board Anti-Malware</strong> – Automatically scans files and quarantines/destroys bad apps/files based on policy settings.</p>
<p><strong>Comprehensive Audit Capabilities</strong> – Have a complete record of file activity (including name changes on the device), password attempts, device locations and machines, device health, and policies in force.</p>
<p><strong>Data Geofencing</strong> – SafeConsole uses geofencing, trusted networks, and ZoneBuilder to ensure a device changes its security posture based on its location.</p>
]]></content:encoded>
										</item>
		<item>
		<title>DeviceLock &#8211; Portkontroll</title>
		<link>https://insec.no/produkt/devicelock-portkontroll/</link>
				<pubDate>Tue, 25 Oct 2016 08:25:06 +0000</pubDate>
		<dc:creator><![CDATA[oddhenrik]]></dc:creator>
		
		<guid isPermaLink="false">https://www.insec.no/?post_type=product&#038;p=762</guid>
				<description><![CDATA[Secure Your Data &#38; Prevent Data Leakage With DeviceLock.
<strong>DeviceLock DLP Suite</strong> consists of five modules that protect your organization from data leak threats.

&#160;]]></description>
								<content:encoded><![CDATA[<p><strong>DeviceLock</strong> provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved to or from company laptops or desktop PCs via devices like phones, digital cameras, USB sticks, CD/DVD-R, tablets, printers or MP3 players. In addition, policies can be set and enforced for copy operations via the Windows Clipboard, as well as screenshot operations on the endpoint computer.</p>
<p><strong>NetworkLock</strong> adds contextual-level control of user network communications via the Internet through such means as: company email, personal webmail, instant messaging services, social networks (like Facebook, Google+, Twitter), web surfing, FTP file transfers, as well as cloud-based file sharing services like Dropbox, SkyDrive and Google Drive.</p>
<p><strong>ContentLock</strong> adds the capability to look inside files and other data objects (like emails and webmails, chats, blog posts, etc.) for sensitive information like social security numbers, credit card numbers, bank account numbers or other user-definable information and to make block-or-allow decisions based on policies having to do with file contents.</p>
<p><strong>Discovery</strong> is a separately licensed component, which helps network administrators and security personnel locating certain types of content stored within and outside the limits of the corporate network. Discovering unwanted content is essential when trying to protect the company’s intellectual property, control employee activities and administer computer networks.</p>
<p><strong>Search Server</strong> is an optional separately licensed component, which provides full-text searching of logged data. The full-text search functionality is especially useful in situations when you need to search for shadow copies of documents based on their contents.</p>
<p><img class="alignright wp-image-761 size-full" src="https://insec.no/wp-content/uploads/2016/10/dl_scheme_ad.png" alt="dl_scheme_ad" width="440" height="410" srcset="https://insec.no/wp-content/uploads/2016/10/dl_scheme_ad.png 440w, https://insec.no/wp-content/uploads/2016/10/dl_scheme_ad-300x280.png 300w" sizes="(max-width: 440px) 100vw, 440px" />The combination of all of these modules working together is the DeviceLock DLP Suite. The DLP Suite provides protection against local and network data leaks at the endpoint (laptop, desktop or server) via a wide array of threat vectors.</p>
<p>These include: iPhones, Androids, BlackBerry, other smart-phones, iPods, iPads, digital cameras, Wi-Fi, Bluetooth, FireWire, social media, IM, webmail, company email, printing, CD or DVD ROM, USB flash drives, Compact Flash, FTP/FTPS, HTTP/HTTPS and the clipboard.</p>
<p>Natively integrated with Microsoft Active Directory Group Policy, the DeviceLock DLP Suite is very easy and straight-forward to install and configure. Typical installations are handled by Microsoft Network Administrators and do not require expensive, specially trained resources.</p>
<p>The other great customer benefit of DeviceLock’s tight integration with Active Directory is that it gives the solution virtually limitless scalability. The DeviceLock DLP Suite can effortlessly run on every endpoint listed in your Active Directory database … even if there are tens of thousands.</p>
]]></content:encoded>
										</item>
	                                          </channel>
</rss>
