DriveLock Release 2020 with new functions

drive lock

Share post

The new DriveLock 2020.1 release comes with numerous improvements and implements customer requests as updates: vulnerability scanners, self-service portal for users, pre-boot authentication and much more.

DriveLock releases the new 2020.1 release with many improvements and enhancements. The innovations include the DriveLock vulnerability scanner, the network capability of the DriveLock pre-boot authentication including direct login to the Active Directory, the self-service portal for users, e.g. for password reset, and the complete management of Microsoft Defender Antivirus in DriveLock. Additional protection functions and automatic configuration options increase IT security and reduce administrative work thanks to automatic learning of the behavior of applications. In addition, the DriveLock Operations Center significantly increases user-friendliness with new views, reports and administrative functions.
"It was important to us to make the daily use of DriveLock even easier and more intuitive so that users can complete tasks quickly and easily," says Anton Kreuzer, CEO of DriveLock. "That is why we implemented numerous requests from our customers in the 2020.1 release and at the same time further increased IT security and the user-friendliness of the DriveLock Zero Trust platform with detailed improvements."

DriveLock vulnerability scanner

The new vulnerability scanner searches a computer system automatically and regularly for previously known Windows vulnerabilities. We use a database that is updated several times a day. The results found are then displayed in the DriveLock Operations Center (DOC) in a separate new view and with an assessment of the risk and impact, including missing patches, outdated software programs or libraries with known vulnerabilities. This enables security teams to assess the level of security in the company more precisely and set automatic notifications based on the ratings.

An extended, role-based authorization model allows a security concept that is precisely adapted to the organizational structure. The special feature: which data a user sees within the DOC can also be configured. Users with different roles only see the computers and the associated data from their area of ​​responsibility. With the network pre-boot authentication, DriveLock customers can implement completely new application scenarios for the first time. Users now log on to the Active Directory directly and without prior synchronization, provided the computer is directly connected to the company network. In the case of multi-user laptops in particular, the provisioning that was previously necessary is no longer necessary. In an emergency, another user can log on to an encrypted computer. "Wake-On-LAN" with automatic software distribution in the company is thus easily solved together with the DriveLock hard disk encryption and allows even stationary systems to be easily and efficiently protected against theft.

The DriveLock Self-Service Portal for end users is also new. The user can call up the self-service portal around the clock via a normal browser, which is also available on all smartphones. With the correct answer to three previously set up questions and an additional TAN, he can identify himself here even without a password. “Our customers can use it to reduce the workload on the hotline and thus save costs,” says Mark Hartmann, Vice President Product Management at DriveLock. "Thanks to self-service responses and automatic TANs, you can verify your access at any time of the day or night without involving an employee."

For more IT security, a better overview and less administration

With Microsoft Defender Antivirus, you can not only make settings relating to protection against malware, but also a number of other options for running programs. Due to the integration in DriveLock, only the DriveLock Management Console is required for this configuration, with which the whole thing is not only much easier to implement, but also easier to coordinate with the much more extensive safety functions of DriveLock application control. In combination with the DriveLock interface control, the release of external drives for users is tied to the result of a detailed scan: If Microsoft Defender Antivirus detects malware, it will not be released. Further automation is possible in connection with DriveLock Endpoint Detection and Response. If Microsoft Defender Antivirus detects a threat, the computer can be shut down using a script, for example, or a DriveLock security campaign with the next steps is automatically displayed.

One of the new views in the DOC also includes Microsoft Defender Antivirus status reports on current threats and the health of clients. Together with the revised user interface, new filter functions, the graphical representation of the security situation and the expanded navigation area in the DOC, administrators get a better overview of the threats in their company. Found threats can be analyzed more precisely and, if necessary, the user can suppress the notification of false reports or irrelevant reports. This means that administrators are not distracted with irrelevant messages and can concentrate on other tasks.

Optimized application control

With the improvements in application control, DriveLock aims to make everyday work easier for administrators. So much knowledge about the behavior of individual applications is no longer necessary for configuration. For example, which libraries they call or which directories data are written to. DriveLock does all of this by learning the behavior of the application through temporary monitoring. The previously defined application or the defined folder is automatically monitored over a period of time to determine which actions the application is performing. The administrator then uses this data to create suitable application rules for the whitelist. Untypical behavior is prevented immediately and users cannot circumvent existing security measures. In addition, users can be notified when an application does something unexpected. This ranges from simple reports to the start of a security awareness campaign. This not only creates transparency, but also continuously and sustainably ensures that users are more safety-conscious and learn from them all the time.
DriveLock Release 2020.1 - Smarter, leaner, more intuitive

With the 2020.1 release, DriveLock not only improves the security measures of its Zero Trust platform, but also simplifies the daily use of the solution for administrators and users. New views and filter functions, intuitive navigation, intelligent tools and extended automation options significantly increase user-friendliness and also reduce administrative work so that users can concentrate on important tasks.

More on this at Drivelock.de

 


About DriveLock

The German company DriveLock SE was founded in 1999 and is now one of the leading international specialists for IT and data security with branches in Germany, France, Australia, Singapore, the Middle East and the USA. In times of digital transformation, the success of companies depends to a large extent on how reliably people, companies and services are protected against cyber attacks and the loss of valuable data. DriveLock is committed to protecting corporate data, devices and systems. For this purpose, the company relies on the latest technologies, experienced security experts and solutions based on the zero trust model. In today's security architectures, zero trust means a paradigm shift based on the maxim "Never trust, always verify". In this way, data can be reliably protected even in modern business models.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more