Library
Whitepaper, E-Books and Studies
Whitepaper

Application Control
Application control is an essential component of endpoint security. It enables administrators to control the execution of any application on any computer. The flexibility to combine both blacklist and whitelist rules makes application control both easy to use and powerful to secure.
Read Now

Vulnerability Management
Attackers exploit vulnerabilities or weaknesses in software to gain control of computer systems, steal sensitive information, and cause disruption to operations. DriveLock identifies vulnerabilities on endpoints and thus prevents potential malware attacks.
Read Now

Smartcard Middleware
The use of DriveLock SmartCard middleware makes it possible to perform secure multifactor authentication for a large number of applications (web applications, e-mail or VPN clients, browsers, SSO, hard disk and file encryption) so that you can overcome the vulnerability of insecure passwords.
Read Now

IT security in the public sector
In an increasingly networked world, the growing number of cyber attacks and the evolution of ever advanced malware, means IT security has never been so important. Particularly among public authorities, offices and public bodies, sensitive information are stored as data. With this whitepaper, we would like to help you identify challenges and risks, and take precautions in cyber security.
Read Now

IT security in the healthcare sector
We are experiencing great change in both medicine and the use of digital technologies. The development towards an "intelligent hospital" offers great opportunities. However, digitisation also increases the risk of exposure to cyber attacks. With this whitepaper we would like to support you in taking an overview of the "patient IT security" in your institution and derive effective, comprehensive measures.
Read Now

The Essential Eight
The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies to help organisations prevent cyber security incidents caused by various online threats. The Essential Eight is the baseline of these recommended mitigation strategies. Implementing these strategies as a minimum makes it much harder for adversaries to compromise systems. Our whitepaper explains the Essential Eight strategies as well as how DriveLock can support organisations in implementing them.
Read Now

Hardening every level. Protecting People, Devices, Applications, and Data Across Nordic Societies.
This whitepaper examines strategies to defend critical infrastructure, from power grids to telecommunications, against evolving cyber threats.
Read Now

IT security in the defence sector
Find out how companies from defense sector can protect their confidential data with DriveLock's solutions. Our white paper provides tips for the necessary IT security measures.
Read Now
E-Books

Security Awareness
With various prevention tools and security solutions used to protect IT networks in companies and organisations against external attacks, cyber criminals use targeted methods that focus on human behaviour.
After all, people are responsible for whether a cyberattack is successful or not. Read how to start an effective security awareness program in our E-Book.
Read Now

Native Security
BitLocker disk encryption, Defender antivirus and local security settings in the operating system are part of a set of native security solutions Microsoft provides to its customers.
DriveLock not only optimises the management of the native security solutions, but also adds important functionality to them, creating real value by combining the data collected from the operating systems with DriveLock, resulting in greater security.
Read now

Zero Trust
The Zero Trust concept focuses on protecting critical data. It takes into account today's heterogeneous infrastructures with a multitude of devices to be protected and it treats every access, every application, every device with the same level of care - whether internal or external.
Read our E-Book to learn how to implement Zero Trust in your own organisation and thus ensure comprehensive protection of business-critical data.
Read Now
Flyer

Application Control
Secure, simple and future-oriented - the intelligent application control provides secure protection against cyber attacks and reliably controls the execution of programs.
Read Now

Application Behaviour Control
Built on DriveLock Application Control, Application Behavior Control provides additional security by controlling application behavior using application permissions.
Read Now

Device Control
Intelligent Device Control - only required devices and disks are permitted.
Read Now

Company Flyer
DriveLock introduces itself.
Read Now

Human Risk & Awareness
Eliminate the top cyber threat affecting your data! Transparent and sustainable.
Read now

Common Criteria
DriveLock's Device Control and Application Control solutions have been awarded Common Criteria certification EAL 3+ by the independent Swedish CSEC authority.
Read now

Data Protection
DriveLock encrypts your data reliably and quickly using transparent hard disk encryption. Transparent file and folder encryption provides a unique user or group based encryption that is easy to configure.
Read now

Managed Security Services
Data security with the DriveLock Zero-Trust platform: DriveLock's Managed Security Services meet the highest safety standards.
Read now

MS BitLocker Management
Manage BitLocker centrally with DriveLock - supports all common BitLocker authentication methods such as SmartCards or Tokens and reduces administration effort.
Read now

MS Defender Management
DriveLock integrates the management of Microsoft Defender Antivirus and enables common, convenient centralised management of DriveLock prevention tools with Microsoft Defender. No additional Microsoft management solutions are required for configuration.
Read Now

Native Security Management
DriveLock simplifies the management of the native security solutions, adds important functions and creates real added value for more eff ective cyber security.
Read now

365 Access Control
Eliminate unintentional file sharing in Microsoft 365 with one click.
Read now

Risk & Compliance
Comprehensive prevention measures are crucial. However, it does not offer one hundred percent protection. Boost your defences when other controls fail.
Read now

Security Awareness
Strengthen not only your IT security systems but also your "human firewall". Targeted training measures increase awareness of IT risks.
Read now

Smart Card Middleware
DriveLock SmartCard Middleware supports more than 100 smartcards & tokens. This ensures flexibility and financial independence.
Read now
Reports and Studies

Case Study the Bourges Hospital Center
Find out how The Bourge Hospital Centre has opted for the automated notification solution NetSupport Notify and the data security solution DriveLock from Query Informatique.
Read Now

ISG Provider Lens
The study "ISG Provider Lens™ Cyber Security - Solutions & Services" aims to support IT decision-makers in selecting qualified local solution providers, making the best use of their limited IT security budgets.
Read Now
NO OBLIGATION, NO COMMITMENT.
Free 30-day trial without obligation
See for yourself. Test the usage scenarios relevant to your company.
Test today - Be HYPERSECURE tomorrow!
NO OBLIGATION, NO COMMITMENT.
Free 30-day trial without obligation
See for yourself. Test the usage scenarios relevant to your company.
Test today - Be HYPERSECURE tomorrow!