DeviceLock Testimonials

  • "It is so easy for people to unintentionally compromise security via the USB port. We made this a top priority, though we want to control the use of other device-level risks as well."

  • "An audit from the FSA reinforced our belief that our IT department should know exactly who is using, or accessing, what device at any given time. We had an endpoint security policy in place, but we realised that in order to effectively support our staff in all locations, we needed …

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked