Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner  Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT SecurityTo the Blog

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Endpoint Protection (3)

Wooden dices with letters on them

1 min read

New functions and enhancements in DriveLock Release 2020.2

Updated features include early threat detection, application control, the DriveLock Operations Center and more Munich, Germany. February 19th 2021 –...

Read More
Gedruckte Diagramme

1 min read

DriveLock Expands Operations in ANZ

The leading German Endpoint Protection provider expands in ANZ with a new Channel Sales Manager DriveLock has appointed David Weinstein as the...

Read More
Back view of a programmer sitting and writing code in a dark room

1 min read

Protection in your home office

As we brace ourselves to contain the spread of Covid-19 globally, it is of utmost importance for companies and enterprises to upkeep their business...

Read More
Banner of RSA Conference in San Francisco

1 min read

DriveLock - perfectly positioned for RSA 2020

With over 36,000 attendees, 700 speakers, and 650 exhibitors, the RSA conference in San Francisco was a successful and rewarding event. The...

Read More
Graphic of investigation

2 min read

Modern Endpoint Security & EDR

The importance of endpoint security continues to be prevalent in today's threat landscape as 70% of all breaches are found to have originated from...

Read More
Filled boxes on the checklist

2 min read

How to implement Zero Trust Strategy in 3 easy steps

The major strategic objective of cyber security in the digital age is to combat and contain privacy violations. A company's data is its most valuable...

Read More
The Zero Trust security architecture as a pillar model

3 min read

7 principal pillars of Zero Trust Model

The major strategic goal of cyber security in the digital age is to combat and mitigate data breaches. A company's data is its most valuable asset to...

Read More
Two experts sitting in front of computer which displays a code

4 min read

This is how IT security works with Zero Trust today

TABLE OF CONTENT WHY TODAY'S IT SECURITY ARCHITECTURES SHOULD BE DESIGNED ACCORDING TO THE ZERO TRUST MODEL WHAT USED TO WORK DOES NOT WORK ANYMORE:...

Read More
DriveLock - News Header 600x350

3 min read

DriveLock Delivers Zero Trust Platform to the Endpoint

The German IT security specialist supports the paradigm shift in IT security with its fully integrated Zero Trust Platform Munich, Germany. 28...

Read More
A man in front of numeric code

3 min read

Zero Trust - The Blueprint To Safeguard Your Digital Business

Enter the concept of "Zero Trust" in cybersecurity. It's not just a buzzword; it's a paradigm shift. Zero Trust challenges conventional wisdom and...

Read More