DriveLock Description

The HYPERSECURE Platform by DriveLock is designed to fortify IT systems against cyber threats. Just as securing your home is a given, protecting business-critical data and endpoints should be seamless. DriveLock’s advanced security solutions ensure full lifecycle data protection, combining state-of-the-art technology with deep industry expertise.

Unlike traditional security models that rely on patching vulnerabilities, the DriveLock Zero Trust Platform proactively prevents unauthorized access. With centralized policy enforcement, only authorized users and endpoints gain access to essential data and applications—strictly adhering to the never trust, always verify principle.

Pricing

Free Trial:
Yes

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
DriveLock
Year Founded:
1999
Headquarters:
Germany
Website:
Update This Listing

Media

DriveLock Screenshot 1

Product Details

Platforms
Web-Based
Types of Training
Training Docs
Training Videos
Customer Support
Business Hours
Online Support

DriveLock Features and Options

Endpoint Protection Software

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Data Governance Software

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Vulnerability Management Software

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

SIEM Software

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Endpoint Detection and Response (EDR) Software

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Configuration Management Software

Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management

Security Awareness Training Program

Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library

Encryption Software

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

DriveLock Lists

DriveLock User Reviews

Write a Review
  • Previous
  • Next