Springe zum Hauptinhalt


HYPERSECURE PlatformZero Trust Strategy




News, Information AND Tips ABOUT IT SecurityTo the Blog
Service Desk Partner  Portal



News, Information and Tips about IT SecurityTo the Blog

4 min read

5 reasons to run DriveLock in the cloud

5 reasons to run DriveLock in the cloud

Your organization is much safer with a good security product. That’s a fact. But think of all the work: With an on-premises solution you’ll have to deal with administration, application, security infrastructure, maintenance, and upkeep yourself. Apart from being a burden on IT and your financial resources, all this takes up valuable time and might even open security issues. Instead of compromising your security, take the burden off your company and opt for a cloud-based deployment model.



The cloud: secure and convenient

These are the four concerns we often hear about cloud deployments: 

#1 data is much safer on-premises

Commonly, people are concerned about how secure the cloud is. Hyperscalers like Microsoft, AWS, and Google are spending enormous financial and organizational efforts to protect their cloud data centers. That means they can provide more security when used to host applications. Small and medium-sized companies cannot keep up with this.

Protecting data is a critical issue, particularly in the security sector. It is important that customers can trust the solution they are using. Understanding precisely how data is collected, processed, and stored is important here. The DriveLock cloud-based solution relies on inventory data to provide a proper set of rules. We collect event data to be able to prove and/or document how endpoints are being protected. That's exactly what administrators need when doing forensic analysis in the context of cyber incidents.  

Conclusion: You can clearly see purpose-driven data processing here.

Microsoft Azure is a strong partner for DriveLock. Together, Microsoft Azure and DriveLock ensure confidentiality, integrity, and availability of personal data. We use the global network of Microsoft data centers to process and store customer data in local data centers. In the DACH region, the primary data center is located in Frankfurt am Main, Germany. Apart from the high IT security certificates, German data centers are required to meet various other technical construction standards. We also have backup data centers in Paris, for example, and in the USA and Australia. All data in the data centers remains in the respective jurisdiction and for Germany in particular, the GDPR/DSGVO applies. 


Ensuring that data is protected and secure is not a matter of an on-premises or cloud solution. The question of who can access which data, and from where, is not primarily determined by whether the data is stored on-premises or in the cloud. Instead, the key factor is having a sound Zero Trust strategy. In other words, allowing employees to access only the data they need, for example. No more, no less.  


Many companies consider the initial cost of infrastructure. However, they tend to forget about follow-up costs for updates, licenses, 3rd parties and energy. Microsoft’s TCO calculator allows you to quickly calculate the cost of deploying applications over a period of time. Outsourcing saves infrastructure and maintenance costs. 


A company's IT department is frequently busy with multiple tasks, resulting in some issues being overlooked in the day-to-day work. Especially where security is concerned, this shouldn't happen. Attackers use the time we don't take to learn and evolve with new technologies and capabilities. But it's not just cybercriminals who are ready, DriveLock is too. 



The benefits are clear: organizations can immediately take their IT security to a higher level, they don't need to allocate resources to management, infrastructure, or hardware and software. 

At DriveLock, we have highly experienced security experts and are constantly adapting our solution portfolio dynamically in response to cyber threats. DriveLock Application and Device Control have the internationally accredited Common Criteria EAL3+ certification and meet the requirement for deployment to public sector clients and critical infrastructure. 

DriveLock Managed Security provides organizations with dedicated configuration options, for example, for various compliance policies or the implementation of the GDPR. 


  1. Simple and fast
    Migrating to the cloud starts out with a fully guided configuration. We will guide you one step at a time to get the application up and running right away. Standardized security profiles are already available. You can customize them to meet your specific needs. 
  2. Saves resources
    Cloud provisioning uses a subscription model based on the number of endpoints. Our motto: No CapEx, just OpEx. This gives you the advantage of minimizing financing risk and capital expenditures, having more cash available, and flexibility through customization as needed. In addition, you do not depend on infrastructure or networks. No costs for data centers, no maintenance of hardware and software. Our security experts manage and keep the solution portfolio up to date by regularly adapting it to the latest cyber threats. This helps save financial resources and reduces the workload on the customer's IT department.
  3. Less effort plus experienced security experts
    DriveLock is responsible for managing the application. You, as the customer, will have less effort but security experts supporting you. We provide a completely managed service. This means that our experienced professionals handle the hosting of the entire solution. 
  4. Reliable and up-to-date security fixes
    We focus on security. In the cloud, bugs are fixed, and new features are updated quickly. They are available to you at no extra cost. Plus, the cloud means less downtime, easier failover, and better scalability.
  5. No additional costs for updates, etc.
    Upgrades to the application are included and do not require separate installation or additional time. We provide qualified support and set up a specific cost plan for you according to your subscription model.



If you decide to migrate your on-premises application to Endpoint Security from the cloud, we are here to help. We have designed a migration plan in cooperation with customers who have already migrated successfully, so that you can move to the cloud as efficiently as possible. 

The first question to ask when migrating is whether you want to migrate your entire history. If so, your next step is a database backup. We will import it into the cloud. After that, DriveLock will verify the configuration and provide you with a script to connect the existing on-premises agents to the cloud. 

If you do not want to migrate your entire history, you can export your policies. These are then imported into the cloud and reconnected as well. 

Please contact us for more information. We also have a range of white papers available free of charge.

DriveLock's new brand identity

DriveLock's new brand identity

DriveLock with a new look & feel DriveLock has enhanced its brand identity as part of the strategic focus to position its endpoint protection...

Read More
Best Practices for Endpoint Security for your Business

Best Practices for Endpoint Security for your Business

In today's rapidly evolving digital landscape, endpoint security stands as the frontline defense against a myriad of cyber threats. As organizations...

Read More
13 tips on Ensuring Cyber Safety in Legal Offices

13 tips on Ensuring Cyber Safety in Legal Offices

In the digital age, the legal landscape is rapidly evolving, and with it comes a critical imperative: cyber safety. As the legal profession...

Read More