Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

Library

Whitepaper, E-Books and Studies

 

Whitepaper

drivelock_whitepaper_spaltenbild

Application Control

Application control is an essential component of endpoint security. It enables administrators to control the execution of any application on any computer. The flexibility to combine both blacklist and whitelist rules makes application control both easy to use and powerful to secure.


Read Now

drivelock_whitepaper_spaltenbild

Vulnerability Management

Attackers exploit vulnerabilities or weaknesses in software to gain control of computer systems, steal sensitive information, and cause disruption to operations. DriveLock identifies vulnerabilities on endpoints and thus prevents potential malware attacks.


Read Now

drivelock_whitepaper_spaltenbild

Smartcard Middleware

The use of DriveLock SmartCard middleware makes it possible to perform secure multifactor authentication for a large number of applications (web applications, e-mail or VPN clients, browsers, SSO, hard disk and file encryption) so that you can overcome the vulnerability of insecure passwords.


Read Now

drivelock_whitepaper_spaltenbild

IT security in the public sector

In an increasingly networked world, the growing number of cyber attacks and the evolution of ever advanced malware, means IT security has never been so important. Particularly among public authorities, offices and public bodies, sensitive information are stored as data. With this whitepaper, we would like to help you identify challenges and risks, and take precautions in cyber security.


Read Now

drivelock_whitepaper_spaltenbild

IT security in the healthcare sector

We are experiencing great change in both medicine and the use of digital technologies. The development towards an "intelligent hospital" offers great opportunities. However, digitisation also increases the risk of exposure to cyber attacks. With this whitepaper we would like to support you in taking an overview of the "patient IT security" in your institution and derive effective, comprehensive measures.


Read Now

drivelock_whitepaper_spaltenbild

The Essential Eight

The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies to help organisations prevent cyber security incidents caused by various online threats. The Essential Eight is the baseline of these recommended mitigation strategies. Implementing these strategies as a minimum makes it much harder for adversaries to compromise systems. Our whitepaper explains the Essential Eight strategies as well as how DriveLock can support organisations in implementing them.


Read Now

drivelock_whitepaper_spaltenbild

Hardening every level. Protecting People, Devices, Applications, and Data Across Nordic Societies.

This whitepaper examines strategies to defend critical infrastructure, from power grids to telecommunications, against evolving cyber threats.


Read Now 

drivelock_whitepaper_spaltenbild

IT security in the defence sector

Find out how companies from defense sector can protect their confidential data with DriveLock's solutions.  Our white paper provides tips for the necessary IT security measures.


Read Now 

 

E-Books

drivelock_e-book_spaltenbild

Security Awareness

With various prevention tools and security solutions used to protect IT networks in companies and organisations against external attacks, cyber criminals use targeted methods that focus on human behaviour.

After all, people are responsible for whether a cyberattack is successful or not. Read how to start an effective security awareness program in our E-Book.


Read Now

drivelock_e-book_spaltenbild

Native Security

BitLocker disk encryption, Defender antivirus and local security settings in the operating system are part of a set of native security solutions Microsoft provides to its customers.

DriveLock not only optimises the management of the native security solutions, but also adds important functionality to them, creating real value by combining the data collected from the operating systems with DriveLock, resulting in greater security.


Read now

drivelock_e-book_spaltenbild

Zero Trust

The Zero Trust concept focuses on protecting critical data. It takes into account today's heterogeneous infrastructures with a multitude of devices to be protected and it treats every access, every application, every device with the same level of care - whether internal or external.

Read our E-Book to learn how to implement Zero Trust in your own organisation and thus ensure comprehensive protection of business-critical data.


Read Now

 

Flyer

drivelock_ flyer_spaltenbild

Application Control

Secure, simple and future-oriented - the intelligent application control provides secure protection against cyber attacks and reliably controls the execution of programs.


Read Now

drivelock_ flyer_spaltenbild

Application Behaviour Control

Built on DriveLock Application Control, Application Behavior Control provides additional security by controlling application behavior using application permissions.


Read Now

drivelock_ flyer_spaltenbild

Device Control

Intelligent Device Control - only required devices and disks are permitted.


Read Now

drivelock_ flyer_spaltenbild

Company Flyer

DriveLock introduces itself. 


Read Now

drivelock_ flyer_spaltenbild

Human Risk & Awareness

Eliminate the top cyber threat affecting your data! Transparent and sustainable.


Read now

drivelock_ flyer_spaltenbild

Common Criteria

DriveLock's Device Control and Application Control solutions have been awarded Common Criteria certification EAL 3+ by the independent Swedish CSEC authority.


Read now

drivelock_ flyer_spaltenbild

Data Protection

DriveLock encrypts your data reliably and quickly using transparent hard disk encryption. Transparent file and folder encryption provides a unique user or group based encryption that is easy to configure.


Read now

drivelock_ flyer_spaltenbild

Managed Security Services

Data security with the DriveLock Zero-Trust platform: DriveLock's Managed Security Services meet the highest safety standards.


Read now

drivelock_ flyer_spaltenbild

MS BitLocker Management

Manage BitLocker centrally with DriveLock - supports all common BitLocker authentication methods such as SmartCards or Tokens and reduces administration effort.


Read now

drivelock_ flyer_spaltenbild

MS Defender Management

DriveLock integrates the management of Microsoft Defender Antivirus and enables common, convenient centralised management of DriveLock prevention tools with Microsoft Defender. No additional Microsoft management solutions are required for configuration.


Read Now

drivelock_ flyer_spaltenbild

Native Security Management

DriveLock simplifies the management of the native security solutions, adds important functions and creates real added value for more eff ective cyber security.


Read now

drivelock_ flyer_spaltenbild

365 Access Control

Eliminate unintentional file sharing in Microsoft 365 with one click.


Read now

drivelock_ flyer_spaltenbild

Risk & Compliance

Comprehensive prevention measures are crucial. However, it does not offer one hundred percent protection. Boost your defences when other controls fail.


Read now

drivelock_ flyer_spaltenbild

Security Awareness

Strengthen not only your IT security systems but also your "human firewall". Targeted training measures increase awareness of IT risks.


Read now

drivelock_ flyer_spaltenbild

Smart Card Middleware

DriveLock SmartCard Middleware supports more than 100 smartcards & tokens. This ensures flexibility and financial independence.


Read now

Show more
 

Reports and Studies

drivelock_ studien_spaltenbild

Case Study the Bourges Hospital Center

Find out how The Bourge Hospital Centre has opted for the automated notification solution NetSupport Notify and the data security solution DriveLock from Query Informatique.


Read Now 

drivelock_ studien_spaltenbild

ISG Provider Lens

The study "ISG Provider Lens™ Cyber Security - Solutions & Services" aims to support IT decision-makers in selecting qualified local solution providers, making the best use of their limited IT security budgets.


Read Now 

 
NO OBLIGATION, NO COMMITMENT.

Free 30-day trial without obligation

See for yourself. Test the usage scenarios relevant to your company.


Test today - Be HYPERSECURE tomorrow!

Test 30 days free of charge

 
NO OBLIGATION, NO COMMITMENT.

Free 30-day trial without obligation

See for yourself. Test the usage scenarios relevant to your company.


Test today - Be HYPERSECURE tomorrow!

Test 30 days free of charge

ISO_27001_colour_en DriveLock erhält von Teletrust das IT Security Siegel - made in Germany Data LeakageLoss Prevention and Data Security_Leader PUR_S_2024_Award_Endpoint_Protection_quer PUR_S_2024_Award_Vulnerability_Management_quer microsoft-gold-partner-845x680-1 Mitglied TeleTrust Mitglied bitkom Mitgliedschaft ACS DsiN Mitglied DriveLock erhält von Teletrust das IT Security Siegel - made in EU DriveLock mit seiner Endpoint Protection Platform gewinnt den InfoSec Award des Cyber Defense Magazine Global-InfoSec-Awards-Winner-for-2024_SM Techconsult: Professional User Rating Security Solutions 2022- DriveLock als Champion in Lösungsbereich Endpoint Protection BDSV Mitglied ECSO Updated logo