UBM Global

Register / Get Password

  • English
  • Dutch
  • French
Home icon arrow Themes
Available themes

Currently 37 Themes. Make your choice below.

Data Detection

Data Detection

It identifies sensitive information and reduce its exposure. It finds sensitive content, such as financial data, medical records a

Data Filtering

Data Filtering

DriveLock gives you control what can be copied to or from removable media.

Data Tagging

Data Tagging

Increases the effectiveness of your DLP solution.

Desktop Automation & Connectivity

Desktop Automation & Connectivity

Don’t force users to perform their own complicated Windows 10 & 11 desktop processes. Automate them instead. With Policy

Device Control

Device Control

DriveLock controls the use of all devices. It gives you intelligent control of mobile devices, including digital cameras, MP3 play

Encryption of Full Disks

Encryption of Full Disks

DriveLock Full Disk Encryption eliminates the risk of data loss by theft of laptops on which data is not encrypted. DriveLock Full

Encryption of Removable Media

Encryption of Removable Media

Accidental disclosure of sensitive data due to lost or stolen storage devices can be very costly. DriveLock 2GO Edition can give y

GPO Compliance

GPO Compliance

Deploying and managing Group Policy settings is difficult, but ensuring that the policies you\'ve deployed "work as they shou

GPO Reductions & Transitions

GPO Reductions & Transitions

Group Policy is the best way to granularly manage settings for your Windows infrastructure. Over the years, issues like GPO sprawl

Hardware and Software Inventory for Windows

Hardware and Software Inventory for
Windows

Allows collecting inventory data from Windows through WMI. It collects hardware and software components including a patch list. It

Identity Threat Detection and Response (IDR) for Azure AD

Identity Threat Detection and
Response (IDR) for Azure AD

It let you know when your Azure AD accounts have been compromised. Arm your SOC analysts to see and stop identity-based attacks in

View more themes:left arrow  1  2  3  4  right arrow
Contact | Privacy Policy | Disclaimer | © 2024 UBM Global | Site Design: Tomworks.nl