IT and data security specialist achieves top results in user survey.
By DriveLock on Aug 2, 2022 10:16:50 AM
By DriveLock on Mar 28, 2022 11:00:00 AM
Cyber hygiene - these are simple security principles that every organisation should know and implement to keep all sensitive data under control and protect it from theft or attack.
By DriveLock on Mar 15, 2022 9:33:00 AM
In our article "Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness programs in order to be successful. In this post, we look at why passwords can derail a security concept and how the Zero Trust concept can help solve it.
By DriveLock on Mar 2, 2022 10:00:00 AM
By DriveLock on Feb 23, 2022 9:00:00 AM
More and more new malware variants and so-called fileless attack vectors threaten corporate networks. The AV-TEST Institute registers more than 450,000 new malware and potentially unwanted applications (PUA) every day. In 2021, it registered more than 1312 million malware variants, an average of more than 10 million new variants per month.
Software vulnerabilities are being exploited in a targeted manner - check our blog post about the Log4j hack. So, it is only logical to upgrade technical controls and defense mechanisms as much as possible to prevent the execution of malware, scan software versions for vulnerabilities, enable multi-level authentication, etc.
By DriveLock on Feb 8, 2022 11:00:00 AM
National Security authorities recommend hard disk encryption as an effective measure for protecting data on desktop clients and notebooks in a corporate environment. Many companies make use of BitLocker hard disk encryption provided by Microsoft. But what if you have forgotton your password when booting up or the hardware in the computer has been replaced and the system no longer starts? If that is the case then the only thing that can help is the BitLocker recovery key. Without it you will not be able to access your data. DriveLock BitLocker Management has important additional security options, that can help without exposing the recovery key and risking a misuse of this key.
By DriveLock on Jan 31, 2022 5:00:00 PM
U.S. companies seeking contracts from the U.S. Department of Defense (DoD) and other federal agencies are required to demonstrate strict IT security controls. The DoD imposes strict requirements on the data shared between it and contractors and their subcontractors. To protect this data from cyberattacks, the DoD has developed a comprehensive framework that contractors must demonstrate compliance certification. DriveLock’s cybersecurity modular platform enables manufacturing companies to meet the mandated NIST and new CMMC 2.0 requirements.
By Martin Mangold on Jan 13, 2022 2:33:08 PM
Log4j has been the talk of the town for several weeks now. We have also already commented on this in a detailed post blog about Log4j and Log4Shell.
By Udo Riedel on Dec 20, 2021 1:50:45 PM
"In a sensational wave of attacks, tens of thousands of servers worldwide fell victim to cyberattacks in December 2021 due to a security vulnerability in Log4j. The vulnerabilities had been utilised in the so-called zero-day exploit by a previously unknown espionage group..."
By DriveLock on Dec 17, 2021 9:00:00 AM
DriveLock has been voted one of the Champions in Endpoint Protection in the "Professional User Rating - Security Solutions (PUR-S)" survey conducted by analyst firm techconsult for two consecutive years.
With its security solution, DriveLock is actively involved in the market for more than 15 years. The company with headquarters in Munich, Germany, has become one of the leading IT specialists for IT and data security.
©2022 DriveLock SE | All rights reserved