Whitepaper, E-Books and Studies
Application control is an essential component of endpoint security. It enables administrators to control the execution of any application on any computer. The flexibility to combine both blacklist and whitelist rules makes application control both easy to use and powerful to secure.
The use of DriveLock SmartCard middleware makes it possible to perform secure multifactor authentication for a large number of applications (web applications, e-mail or VPN clients, browsers, SSO, hard disk and file encryption) so that you can overcome the vulnerability of insecure passwords.
IT security in the public sector
In an increasingly networked world, the growing number of cyber attacks and the evolution of ever advanced malware, means IT security has never been so important. Particularly among public authorities, offices and public bodies, sensitive information are stored as data. With this whitepaper, we would like to help you identify challenges and risks, and take precautions in cyber security.
IT security in the healthcare sector
We are experiencing great change in both medicine and the use of digital technologies. The development towards an "intelligent hospital" offers great opportunities. However, digitisation also increases the risk of exposure to cyber attacks. With this whitepaper we would like to support you in taking an overview of the "patient IT security" in your institution and derive effective, comprehensive measures.
The Essential Eight
The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies to help organisations prevent cyber security incidents caused by various online threats. The Essential Eight is the baseline of these recommended mitigation strategies. Implementing these strategies as a minimum makes it much harder for adversaries to compromise systems. Our whitepaper explains the Essential Eight strategies as well as how DriveLock can support organisations in implementing them.
With various prevention tools and security solutions used to protect IT networks in companies and organisations against external attacks, cyber criminals use targeted methods that focus on human behaviour.
After all, people are responsible for whether a cyberattack is successful or not. Read how to start an effective security awareness program in our E-Book.
BitLocker disk encryption, Defender antivirus and local security settings in the operating system are part of a set of native security solutions Microsoft provides to its customers.
DriveLock not only optimises the management of the native security solutions, but also adds important functionality to them, creating real value by combining the data collected from the operating systems with DriveLock, resulting in greater security.
The Zero Trust concept focuses on protecting critical data. It takes into account today's heterogeneous infrastructures with a multitude of devices to be protected and it treats every access, every application, every device with the same level of care - whether internal or external.
Read our E-Book to learn how to implement Zero Trust in your own organisation and thus ensure comprehensive protection of business-critical data.