
- Advanced Configuration
- Advanced Monitoring and Alerting
- App Delivery & Patching
- Application & Service Catalog
- Application Control
- Apps, Browsers, & Java Security
- Attack Path Modeling
- Auditing Devices & Drives
- Autonomous Response
- Change Auditing
- Data Classification
- Data Detection
- Data Filtering
- Data Tagging
- Desktop Automation & Connectivity
- Device Control
- Encryption of Full Disks
- Encryption of Removable Media
- GPO Compliance
- GPO Reductions & Transitions
- Hardware and Software Inventory for Windows
- Integration Services
- Intelligence Augmentation
- Layer 2 Visualization
- Least Privilege Management
- Monitoring Logs, Servers, Virtualization and Applications
- Monitoring Platform
- Network Profiles
- Password Policy Enforcer
- Port Control
- Privileged Account Management
- Self-Learning AI
- Shadowing
- SNMP & Core Monitoring
- Traffic Flow Analyzer
- Windows 10 & 11 Management
Currently 36 Themes. Make your choice below.


Layer 2 Visualization
Layer 2 Topology Mapping. NetCrunch discovers and presents physical connections between switches and nodes on automatic layer 2 to

Least Privilege Management
Manages local admin rights plus blocks ransomware and adds in remotework assistance. Removes local admin rights without impacting

Monitoring Logs, Servers,
Virtualization and Applications
Add monitoring of operating systems and applications running on Windows, Mac OS X, Solaris, Linux, and BSD. Monitor ESXi hyperviso

Monitoring Platform
Regardless of what you need to monitor, you need a solid foundation such as event processing, data logic, storage and the presenta

Network Profiles
DriveLock immediately recognizes when the computer is connected to a different network and applies the settings you configured for

Password Policy Enforcer
Mitigates the risk of security breaches due to weak or stolen passwords It easily enforces strong passwords with flexible passw

Port Control
If you do not control your computer ports, you give the possibility of unauthorized peripheral devices being connected to your com

Privileged Account Management
Reduces attack surface by removing standing privileged accounts that can be compromized by attackers. Enables admins to efficientl

Self-Learning AI
Self-Learning AI learns your business from the ground up to stop cyber disruption.

Shadowing
DriveLock is able to create a shadow copy of files that are copied to and from removable storage media including memory sticks.