Acronis adds DeviceLock to its stable

Acronis has acquired DeviceLock, which provides endpoint device/port control data loss prevention (DLP) software for enterprises and government institutions around the world.

As a wholly-owned subsidiary of Acronis, DeviceLock will integrate its technology into the Acronis Cyber Platform, making new services available through the Acronis Cyber Cloud Solutions portal.

Acronis will continue to work on new versions of the DeviceLock DLP complex while maintaining full technical support.

“By adding DeviceLock’s solutions to our portfolio of cyber protection products and services, we’re giving our partners and customers an easy way to deliver an unprecedented level of functionality among endpoint DLP solutions in an affordable price range,” said Serguei Beloussov, Founder and Executive Officer of Acronis.

“We are looking at both developing new solutions internally, as well as acquiring additional leading vendors to add even more capabilities to our existing repertoire. The world of IT security is always changing, and we are determined to continue evolving our solutions to meet the ever-changing needs of the market,” he added.

DeviceLock DLP is designed to stop data leaks at the source, as nearly two thirds of serious data leakage incidents are caused by employees, contractors or visitors — whether through unintentional mistakes or malicious intent. DeviceLock solutions provide top-class protection of valuable data from this serious insider threat.

The security solution protects four million computers in more than 5,000 organisations from various industries, including banking and finance, medical, pharmaceutical, government and defense, manufacturing, and retail.

Together with DeviceLock’s full DLP suite, Acronis will offer customers and partners a simple and affordable approach to preventing data leaks from corporate Windows and Mac laptops, desktop computers, and virtualized Windows sessions and applications, covering the five vectors of cyber protection — safety, accessibility, privacy, authenticity, and security of all data, applications, and systems.