Ratings and Reviews 1 Rating
Ratings and Reviews 0 Ratings
What is DriveLock?
DriveLock’s HYPERSECURE Platform aims to strengthen IT infrastructures against cyber threats effectively. Just as one would naturally secure their home, it is equally vital to ensure that business-critical data and endpoints are protected effortlessly. By leveraging cutting-edge technology alongside extensive industry knowledge, DriveLock’s security solutions provide comprehensive data protection throughout its entire lifecycle.
In contrast to conventional security approaches that depend on fixing vulnerabilities after the fact, the DriveLock Zero Trust Platform takes a proactive stance by blocking unauthorized access. Through centralized policy enforcement, it guarantees that only verified users and endpoints can access crucial data and applications, consistently following the principle of never trusting and always verifying while ensuring a robust layer of security. This not only enhances the overall security posture but also fosters a culture of vigilance within organizations.
What is Cloudbridge?
Cloudbridge acts as the essential hub where all data and processes come together, allowing users to effectively design and automate workflows from a single, user-friendly interface. It facilitates the connection and integration of your source data with various cloud applications across your extensive IT ecosystem. By leveraging strong master data management capabilities, you can cultivate confidence and dependability in your information. Empower your team by granting them quick and easy access to both data and applications, enabling them to accomplish more tasks in less time. At the center of your data and enterprise architecture, Cloudbridge provides a consolidated platform for synchronizing, refining, reviewing, and altering your master data. This creates a "golden source" of information, ensuring that the data your team depends on is accurate and reliable. As updates are made to your metadata, the changes effortlessly propagate across your applications and systems, promoting a harmonized operational environment. This integration not only enhances decision-making but also contributes to a more responsive and agile organization, ultimately driving greater success. By streamlining processes and centralizing data management, Cloudbridge plays a crucial role in transforming how businesses operate.
Integrations Supported
BitLocker
Microsoft Defender Antivirus
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
DriveLock
Date Founded
1999
Company Location
Germany
Company Website
www.drivelock.com
Company Facts
Organization Name
The Qubix Group
Date Founded
1987
Company Location
United Kingdom
Company Website
www.qubix.com/cloudbridge
Categories and Features
Configuration Management
Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management
Data Governance
Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
Endpoint Detection and Response (EDR)
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Security Awareness Training
Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library
SIEM
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Categories and Features
Data Governance
Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management