Free 30 days trial 

Use Cases

DriveLock Managed Security Service in the field.

 

Implementation of the EU-GDPR / IT-Security

Avoid data loss:

  • Control all endpoint interfaces for data communication.
  • Implementation of granular policy requirements
  • Integrated Security Awareness Module to sensitize your employees to security issues

EU-DSGVO compliant:DriveLock Managed Security Service

  • Anonymisation of logs and events
  • 2-person authentication for encrypted shadow copies
  • 2-person authentication for access to reports and events

Real-time security

  • Predictive whitelisting based on Machine Learning
  • Preventing zero-day exploits
  • Prevent execution of unknown software
  • Blocking of unknown end devices and data carriers
  • Protection of mobile users (notebooks) against cyber attacks

Reporting

  • Real-time reporting of unauthorized accesses
  • Reporting of data transfers from and to external devices / data carriers incl. shadow copies (optional)

Holistic IT security

  • With the EU-DSGVO, companies must take security measures to protect sensitive data.
  • DriveLock enables you to meet these requirements. You encrypt your end devices and receive proof of access and access control via the Analytics & Forensics function.

Free 30 days trial 

 

Protection of industrial plants

Due to the network connectivity of production plants associated with industry 4.0, protection becomes the focus of attention

Defence against internal and external attacksIoT automation

Attacks on production facilities, critical infrastructures (KRITIS) or devices that do not belong to classic IT are no longer dreams of the future, but reality in everyday manufacture business. According to a BITKOM study, every second company is now threatened by cyber attacks.

Industrial companies are particularly in focus here: Production systems have a longer life cycle. For example, the operating systems running on computers, are still in use for about 7 to 10 years after the official end-of-life. From this point on, no more security updates (patches, hotfixes, etc.) are provided. Hackers use these security gaps specifically to install malware on the client.

The effective combination of device and application control comprehensively protects the manufacturing process. All interfaces of the PCs involved in the manufacturing process are monitored or blocked. The same applies to the applications used. The machine learning algorithm automatically manages the local whitelist and controls the execution of applications. Nevertheless, service technicians must be able to install software updates, e.g. via the USB interfaces of the devices.

IoT automation IISimply plug in the USB stick and accept the usage guidelines. Now you can install applications on the production line in a defined time window. Machine Learning ensures that all executed and copied files are whitelisted.

If access to the USB interfaces is to be further restricted, maintenance can still be carried out efficiently via DriveLock SelfService.

Since all external drives are blocked, start DriveLock SelfService to allow access to the USB stick.

Deactivating the application control activates a learning mode. All executed and copied files are automatically whitelisted by DriveLock Machine Learning.

After software maintenance, the production line is secured again.

It is no longer possible to run unauthorized applications or use devices without explicit user authorization.
Optional: DriveLock can grant access to the same USB stick when a technician comes back for maintenance.

Free 30 days trial 

 

Cyber attacks in the financial industry

Current challenges in the financial sector

  • Increasing Third-Party Risks - The use of sensitive company data by different parties - internal employees, external financial advisors, etc. - introduces increased risks for data protection and unwanted data loss.
  • Increased compliance requirements - Introduction of an information security management system based on ISO/IEC 27001 for compliance with legal requirements and internal compliance requirements.
  • Growing number of mobile devices - Mobile devices in the enterprise increase the risk potential for data thefts and cyber attacks and require an end-point-oriented security concept.
  • Significant increase in cyber attacks - cyber attacks by organized criminal groups, hackers, activists or even by own employees grow exponentially

Free 30 days trial 

 

 

 
 

Subscribe to our News Service

We will keep you up-to-date about current IT- and Cyber Security topics.