Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

DriveLock

Back view of a programmer sitting and writing code in a dark room

1 min read

Protection in your home office

As we brace ourselves to contain the spread of Covid-19 globally, it is of utmost importance for companies and enterprises to upkeep their business momentum in current challenging times. Increasingly, companies are encouraging employees to work from...

Read More
Banner of RSA Conference in San Francisco

1 min read

DriveLock - perfectly positioned for RSA 2020

With over 36,000 attendees, 700 speakers, and 650 exhibitors, the RSA conference in San Francisco was a successful and rewarding event. The...

Read More
Hacker in front of computer after breaking in

2 min read

The Coronavirus gives hackers more freedom to infiltrate your network

In recent weeks, the coronavirus has become the main topic for the global population, health authorities, politicians and organisations. For hackers,...

Read More
Graphic of investigation

2 min read

Modern Endpoint Security & EDR

The importance of endpoint security continues to be prevalent in today's threat landscape as 70% of all breaches are found to have originated from...

Read More
INFOSEC Award Winner banner

2 min read

RSA Conference 2020: DriveLock named winner of the InfoSec Award.

DriveLock Wins in Next Gen Data Leakage Protection category at 8th Annual InfoSec Awards at #RSAC 2020 SAN FRANCISCO (PRWEB) FEBRUARY 25, 2020 –...

Read More
Trends written in the search bar

3 min read

3 Cybersecurity Trends For 2020

Entering into a new decade requires businesses and professionals to rethink, reconsider and update their approach to IT security and ensuring the...

Read More
Zero Trust icons

4 min read

How to implement Zero Trust Strategy in 3 easy steps

The major strategic objective of cyber security in the digital age is to combat and contain privacy violations. A company's data is its most valuable...

Read More
Checklist

3 min read

Risk Assessment with the SPE model

Risk lies around every corner and should be expected at any time. In the world of IT, risk is inherently everywhere and comes in many shapes and...

Read More
Woman writing press release

1 min read

The new DriveLock Release 2019.2 is now available

Updates to application control, usability, DriveLock Operations Center, Microsoft BitLocker, EDR and much more DriveLock, a leading global provider...

Read More
The Zero Trust security architecture as a pillar model

3 min read

7 principal pillars of Zero Trust Model

The major strategic goal of cyber security in the digital age is to combat and mitigate data breaches. A company's data is its most valuable asset to...

Read More