Audience

Organizations across various industries—such as public authorities, industrial companies, healthcare providers, and critical infrastructure sectors—that require customized IT security solutions to protect their data and systems

About DriveLock

Cyber threats are everywhere, but protecting your IT systems should be as natural as locking your front door. With DriveLock’s HYPERSECURE Platform, safeguarding your endpoints and business data is easier than ever. We integrate the latest security technologies and share our expertise, so you can focus on what matters—without worrying about data protection.

Zero Trust Platform takes a proactive approach, eliminating security gaps before they become a risk. By enforcing centralized policies, DriveLock ensures employees and endpoints access only what they need—following the golden rule of cybersecurity: ''never trust, always verify''.

Pricing

Free Trial:
Free Trial available.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

DriveLock
Founded: 1999
Germany

Videos and Screen Captures

DriveLock Screenshot 1

Product Details

Platforms Supported
SaaS
Training
Documentation
Videos
Support
Phone Support
Online

DriveLock Frequently Asked Questions

Q: What kinds of users and organization types does DriveLock work with?
Q: What languages does DriveLock support in their product?
Q: What kind of support options does DriveLock offer?
Q: What other applications or services does DriveLock integrate with?
Q: What type of training does DriveLock provide?
Q: Does DriveLock offer a free trial?

DriveLock Product Features

Configuration Management

Infrastructure Automation
Access Control / Permissions
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management
Application Deployment
Automated Provisioning

Data Governance

Roles Management
Email Management
Deletion Management
Policy Management
Process Management
Access Control
Data Profiling
Data Discovery
Storage Management
Data Mapping

Encryption

Endpoint Encryption
Email Encryption
Encryption Key Management
Full Disk Encryption
File Encryption
Tokenization / Data Masking
Public Key Cryptography
Drag & Drop UI
File Compression
Central Policy Enforcement

Endpoint Detection and Response (EDR)

Malware/Anomaly Detection
Continuous Monitoring
Remediation Management
Blacklisting/Whitelisting
Behavioral Analytics
Prioritization
Root Cause Analysis

Endpoint Protection

Device Management
Application Security
Signature Matching
Antivirus
Whitelisting / Blacklisting
Behavioral Analytics
Activity Log
Web Threat Management
Encryption

IT Security

Intrusion Detection System
Two-Factor Authentication
Anti Virus
Event Tracking
IP Protection
Web Traffic Reporting
Internet Usage Monitoring
Web Threat Management
Anti Spam
Email Attachment Protection
Vulnerability Scanning
Spyware Removal

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Security Awareness Training

Pre-Assessments
Phishing Simulation
Non-Email Based Testing
Analytics / Reporting
Industry Benchmarking
Prebuilt Training Library
Online Courses
Custom Test Building
Gamification
Certification Training

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

DriveLock Additional Categories