{"id":5491,"date":"2024-11-28T09:38:36","date_gmt":"2024-11-28T01:38:36","guid":{"rendered":"https:\/\/www.udshk.com\/?post_type=news&#038;p=5491"},"modified":"2024-11-28T09:44:37","modified_gmt":"2024-11-28T01:44:37","slug":"the-brand-new-drivelock-version-2024-2-is-now-available","status":"publish","type":"news","link":"https:\/\/www.udshk.com\/?news=the-brand-new-drivelock-version-2024-2-is-now-available","title":{"rendered":"The\u00a0Brand New DriveLock Version 2024.2\u00a0is Now Available"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"44\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2024\/11\/drivelock-logo.png\" alt=\"\" class=\"wp-image-5492\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>We have fantastic news!. In this edition, we present to you the latest and most exciting features and improvements included in the current version. <br><strong>The new features and improvements:<\/strong> \u00a0 <br><br><strong>Device Control Enhancements:<\/strong><br><strong>Composite and MTP Device Authorization<\/strong>: End users can more easily authorize multi-function devices, saving time in device management.<br><strong>Drive Class Configuration<\/strong>: Administrators can now centrally manage drives and set specific rules for USB drives.<br><strong>Export of Drive Rules:<\/strong>\u00a0Faster management and reuse of drive and device settings through simple export functions. \u00a0 <br><br><strong>Usage Policy and Content Security<\/strong><br><strong>Usage Policy Extension:<\/strong>\u00a0Users can now use alternative credentials to grant access to drives.<br><strong>Expansion of Content Scanner Events:<\/strong>\u00a0Display of file header information for blocked files provides better insights into security events.<br><strong>Archive Scanner for Network Drives and Containers:<\/strong>\u00a0Encrypted archives and deeply nested folders are now also scanned. \u00a0 <br><br><strong>Application Control Enhancements<\/strong><br><strong>Management in DOC:<\/strong>\u00a0Full integration of AC and ABC functions into the web-based DOC.<br><strong>Process Tree for Forensics:<\/strong>\u00a0Improved forensic analysis through a graphical representation of process calls\u2014ideal for identifying Advanced Persistent Threats (APTs). \u00a0 <br><br><strong>BitLocker Management Enhancements<\/strong><br><strong>Pre-Encryption with TPM-only:<\/strong>\u00a0Provides immediate encryption during device provisioning, ensuring corporate data is protected from the outset.<br><br><br><strong>Improvements in the DriveLock Operations Center (DOC)<\/strong><br><strong>Dark Mode and Style Adjustments:<\/strong>\u00a0Modern design with enhanced user experience (UX). Customizable views provide a personalized working environment.<br><strong>Central Search and Faster Navigation:<\/strong>\u00a0Improved search functions and saved settings make navigation easier in daily workflows. \u00a0<br><br><strong>Platform and License Management<\/strong><br><strong>More Efficient License Management:<\/strong>\u00a0Optimized tenant-based license management for better clarity.<br><br><strong>API Extensions:<\/strong>\u00a0DriveLock platform integration into existing business processes is facilitated by extended API functions. This simplifies change management and further automations. <strong>Automatic Deletion of Inactive Computers:<\/strong>\u00a0Easy inventory cleanup through the automatic deletion of inactive devices. \u00a0 <br><br><strong>Encryption Management and Compliance<\/strong><br><strong>Centrally Managed Encrypted Directories:<\/strong>\u00a0Administrators can centrally manage access to sensitive data, making it easier to comply with compliance regulations. \u00a0 <br><br><strong>Human Risk Assessment &amp; Security Awareness<\/strong><br><strong>Security Awareness Campaigns:<\/strong>\u00a0Integration of Human Risk Assessment allows targeted training and enhances awareness of threats within the company. \u00a0 <br><br><strong>Cross Platform Support<\/strong><br><strong>Encryption2Go on Mac:\u00a0<\/strong>Cross-platform encryption functions are now also available for Mac, further enhancing the security of external drives.<br><strong>AlmaLinux Support:\u00a0<\/strong>DriveLock now also supports AlmaLinux, providing more flexibility in the choice of Linux distributions. For more details and important update information, please contact us at 28510271 or email to info@udshk.com<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The DriveLock solution helps companies protect their data and comply with regulatory requirements. The solution includes preventive measures to avert attacks, and thus prevent systems from becoming infected. DriveLock\u2018s Zero Trust solution platform is constantly evolving to ensure the security of sensitive data.<\/p>\n\n\n\n<p>DriveLock (<a href=\"http:\/\/www.drivelock.com\">www.drivelock.com<\/a>) is a leading international specialist for IT and data security and has been developing security software exclusively in Germany since 1999. DriveLock solutions stand for best possible endpoint protection \u201cMade in Germany\u201c without a backdoor.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have fantastic news!. In this edition, we present to you the latest and most exciting features and improvements included in the current version. The new features and improvements: \u00a0 Device Control Enhancements:Composite and MTP Device Authorization: End users can more easily authorize multi-function devices, saving time in device management.Drive Class Configuration: Administrators can now [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"news-category":[],"class_list":["post-5491","news","type-news","status-publish","hentry","entry","owp-thumbs-layout-horizontal","owp-btn-normal","owp-tabs-layout-horizontal","has-no-thumbnails","has-product-nav"],"_links":{"self":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/news\/5491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5491"}],"version-history":[{"count":0,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/news\/5491\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5491"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5491"},{"taxonomy":"news-category","embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fnews-category&post=5491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}