BLOG

4 min read

New DriveLock 2020.1 release includes multiple enhancements

By DriveLock on Jul 1, 2020 8:22:37 AM

Updates in vulnerability scanner, self-service portal for users, pre-boot authentication and much more


Munich, Germany. 01.07.2020 – DriveLock today unveiled its new Release 2020.1 that offers a wide range of enhancements and extensions. The new features include the DriveLock vulnerability scanner; network-enabled DriveLock pre-boot authentication with direct login via Active Directory; the self-service portal for users, such as for password resets; and the full management of Microsoft Defender Antivirus within DriveLock. Additional protection functions and automatic configuration options increase IT security while reducing the administrative workload, as the system automatically learns application behaviour. Further enhancements include significantly better usability with new views, reports and management functions in the DriveLock Operations Center.

“It was important to us to make the everyday use of DriveLock even simpler and more intuitive to help users complete their tasks quickly and easily,” says Anton Kreuzer, CEO of DriveLock. “That’s why we’ve implemented multiple customer requests in Release 2020.1 and implemented detailed enhancements that further boost IT security and the usability of the DriveLock Zero Trust Platform.”

Continue Reading
2 min read

Australian Businesses Under Attack - How To Protect Yourself

By Alma Pranoto on Jun 22, 2020 8:48:26 AM

On June 19, Australian Prime Minister Scott Morrison reported that businesses are targeted by a sophisticated, state-based cyber actor. In recent months, there has been a prominent increase in attacks targeting all levels of government, political organisations, the private sector, essential services, education, medical research and development. Other countries are also detecting a similar pattern. 

Continue Reading
4 min read

EDR - the Sherlock Holmes of cyber security

By Andreas Fuchs on Jun 2, 2020 11:00:00 AM

Source: iStock

On the trail towards EDR

In our last blog post "Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection tools. Now we would like to present a typical Endpoint detection and response solution with its building blocks.

Continue Reading
3 min read

Silent hacker attacks and the need for detection mechanisms

By Andreas Fuchs on May 26, 2020 2:00:00 AM

Again and again, we read about hacking incidents where attackers can spy on a company, an authority or a ministry and remain unnoticed for months without affecting the systems.

Continue Reading
4 min read

4 Essential Strategies for IT Security

By Alma Pranoto on May 19, 2020 1:00:00 AM

The Base Formula for Preventing Cyber Security Incidents 

Continue Reading
7 min read

Working from Home - 13 Tips for Increased IT Security

By DriveLock on Apr 2, 2020 2:47:13 PM

From one of our previous post, "Coronavirus calls hackers to the scene", we are already informed about basic precautions and protection measures we must take when working from the home office.

Continue Reading
1 min read

Stay Safe - Protection in your home office

By Vincent Ong on Mar 23, 2020 8:10:00 AM

As we brace ourselves to contain the spread of Covid-19 globally, it is of utmost importance for companies and enterprises to upkeep their business momentum in current challenging times. Increasingly, companies are encouraging employees to work from home to minimise physical contact. It is critical for endpoints to be well protected for employees to continue to be productive as they are working from home. However, the situation also presents opportunity for possible cyber security threats, malware attacks and social engineering to take place.

Continue Reading
1 min read

DriveLock - perfectly positioned for RSA 2020

By DriveLock on Mar 17, 2020 8:43:10 AM

With over 36,000 attendees, 700 speakers, and 650 exhibitors, the RSA conference in San Francisco was a successful and rewarding event. The conference was attended by both boutique and well-known IT security firms from around the world.

Continue Reading
3 min read

The Coronavirus gives hackers more freedom to infiltrate your network

By DriveLock on Mar 11, 2020 9:20:10 AM

Source: iStock

What you need to consider when it comes to IT security to keep your systems virus-free.

In recent weeks, the coronavirus has become the main topic for the global population, health authorities, politicians and organisations. For hackers, the panic and hysteria caused by the situation provide a perfect opportunity to successfully distribute malware. Therefore, the virus topic meets all the requirements for a successful cyberattack. 

People require up-to-date information regarding the virus. TV, radio, online guides and news, newsletters or emails are all sources of information that are accessed by the public. 

Continue Reading
3 min read

Modern Endpoint Security & EDR

By Alma Pranoto on Mar 6, 2020 12:58:37 AM

Prevention, Detection and Response - Do You Have Gaps In Your Security Architecture? 

The importance of endpoint security continues to be prevalent in today's threat landscape as 70% of all breaches are found to have originated from the endpoint. More than 42% of endpoints experience encryption failures, 75% of organisations state their IT security team are not able to respond to security incidents aptly and quickly. Therefore Endpoint security plays a very significant role in securing your systems and data. It can prevent data loss, stop the execution of malware opened by negligent employees and protect against malicious traffic. 

Continue Reading

Featured