Internet of Things

Every day the number of devices in the IT network increases

At least since the first car could be steered through the access of a connected fridge the internet of things is mentioned in the IT security industry around the world. Attacks on production facilities, critical infrastructures (KRITIS) or devices that are not part of the classic IT no longer are science fiction than rather reality in the everyday life of a company.

CUSTOMER FEEDBACK

Read what customers say
about DriveLock

The technical capabilities of the attackers are very advanced. They not only have the Know-How in the area of classical IT security, they also have detailed expertise in the area of the used industry controls and production processes.

-BSI

To avoid compromising production clients with critical infrastructures or non IT components by malware, the client needs to be regulated in the area of interface control and applications.

In general these systems have a bigger lifespan than for example the operational systems and applications on the client side. Those usually reach their end of life after 7 to 10 years and no longer are maintained or security updates (patches, hotfixes etc.) no longer are provided. These gaps are being used by Hackers to install malware on the client. Through application control and white listing, this code can neither be installed nor executed and the company avoids security gaps of the operations systems or the applications.

DriveLock for Internet of Things

Your need is best serviced by the following Features:

Encryption
Device Control
Forensics
Thin Client
DriveLock Endpoint Protection – test it now for 30 days!