Ads

Hot Topics

Acronis acquires DeviceLock - Adds Data Loss Prevention and Device Control

Acronis Acquires DeviceLock, Adds Data Loss Prevention and Device Control to Growing Cyber Protection Portfolio. Would you like to know more about this? If yes, you can find the below article useful for your knowledge and business.

Acronis, a global leader in cyber protection, announced (on July 16, 2020) the acquisition of DeviceLock, Inc., a leading provider of endpoint device / port control data leak prevention software for enterprises and government institutions around the world. As part of the agreement, DeviceLock will become a wholly-owned subsidiary of Acronis.


Singapore unicorn company adds DeviceLock’s leading device control and endpoint data loss prevention technology to further advance its business solutions.

A clear leader in endpoint Data Loss Prevention (DLP) protecting 4 million computers in more than 5,000 organizations worldwide, DeviceLock enjoys a global customer presence across a wide variety of business types, including banking and finance, medical, pharmaceutical, government and defense, manufacturing, and retail.

DeviceLock DLP is designed to stop data leaks at the source, as nearly two thirds of serious data leakage incidents are caused by employees, contractors or visitors – whether through unintentional mistakes or malicious intent. 

DeviceLock solutions provide top-class protection of valuable data from this serious insider threat. The acquisition of these new capabilities will help advance Acronis’ mission to deliver world-class cyber protection to every business.

Acronis will integrate DeviceLock’s technology into the Acronis Cyber Platform, making new services available through the Acronis Cyber Cloud Solutions portal. At the same time, Acronis will continue to work on new versions of the DeviceLock DLP complex while maintaining full technical support.

Together with DeviceLock’s full DLP suite, Acronis will offer customers and partners a simple and affordable approach to preventing data leaks from corporate Windows and Mac laptops, desktop computers, and virtualized Windows sessions and applications, covering the Five Vectors of Cyber Protection — safety, accessibility, privacy, authenticity, and security (SAPAS) of all data, applications, and systems.