The DriveLock Way

DriveLock protects your valuable company data from in-
ternal and external threats, misuse or loss,
without burdening your productivity.

  • Made in Germany
  • Modular set-up
  • Fast Roll-out
  • Ease-of-use

What we do

DriveLock is a proven fully-integrated IT-Security Solution that runs on all OS, fat clients, thin clients, zero clients and protects your data in the cloud or on your mobile device. Guaranteed without a back-door!

Malware
Authorized data access
Websecurity
Antivirus
Application Control
Device Control
Encryption
Security Education
Your Data

Websecurity

URL Protection in real-time with the intelligent, market-leading web-filter powered by CYREN.

  • Webfilter
  • Detailliertes Reporting
  • URL-Schutz
READ MORE

Antivirus

Fully-integrated Antivirus powered by CYREN protects your network from external attacks

  • Real-Time Antivirus Protection
  • Anti-Malware
READ MORE

Application Control

Determine who can use or download which applications on which device at any time

  • Blacklisting
  • Whitelisting
  • Configuration
READ MORE

Device Control

DriveLock controls all of the flash drives that enter or leave your IT network

  • Device Scanner
  • Offline-enabling
  • shadow copies
READ MORE

Encryption

With the certified Encryption technology by DriveLock you can prevent data theft and data loss. Regardless of where the data is stored.

  • File and Folder Verschlüsselung
  • Container Verschlüsselung
  • Encryption-2-Go
  • Full Disk Encryption
  • Cloud Encryption
READ MORE

Security Education

With DriveLock you can educate staff on different threats.

  • Online-Training
  • Workshops
  • Warnings and Alerts
READ MORE

Your Data

Your data is the most important commodity of your company. Protecting it from internal and external threats is your duty to ensure ongoing success.

How we do it

Unique DriveLock implementation process ensures quick and successful roll-out

Typical roll-out process of standard security solutions often end in serious negative issues on critical processes

Security Assessment
Weakness Identification
Simulation
Roll-Out
Operations & Monitoring

Manual control and analysis of threat potential.

Some weaknesses will be identified and controlled.

Software will be rolled out onto the IT-ecosystem without preperation, leading to crashes.

Automatic analysis of the security ecosystem using the DriveLock Device Scanner.

Thorough identification of security weaknesses using DriveLock Forensics and the seamless implementation of Microsoft Policy Management.

We offer to host a pilot project, simulating the roll-out in test environment to circumvent difficulties during the roll-out.

Optimally planned and efficient roll-out across all devices in record time.

Ongoing optimization process of the IT security infrastructure to identify and prevent attacks before they happen.

Unique, proven DriveLock roll-out process prevents unwanted negative impact on processes