DriveStrike

Who Uses DriveStrike?

Businesses, schools, organizations, professionals, and individuals that need to protect data and devices from compromise, loss, and theft. Remotely lock, locate, and or destroy devices and data!

What Is DriveStrike?

Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage.

DriveStrike Details

DriveStrike

https://drivestrike.com

Founded 2005

Control & Manage Devices
DriveStrike video
Play
Control & Manage Devices-thumb
-thumb
-thumb
-thumb
-thumb

DriveStrike pricing overview

DriveStrike does not have a free version but does offer a free trial. DriveStrike paid version starts at US$1.50/month.


Starting Price

US$1.50/month

Pricing Details

1-10 devices: Monthly cost per device $1.50 and Annual cost per device $15.00 11 to 25 devices: Monthly cost per device $1.25 and Annual cost per device $12.50 26 to 100 devices: Monthly cost per device $0.99 and Annual cost per device $10.00 101 to 250 devices: Monthly cost per device €0.85 and Annual cost per device €9.25 251 to 500 devices: Monthly cost per device €0.80 and Annual cost per device €9.00 501 to 1000 devices: Monthly cost per device €0.75 and Annual cost per device €8.50 1001 to 5000 devices: Monthly cost per device €0.70 and Annual cost per device €8.00 5001 or more devices: Monthly cost per device €0.60 and Annual cost per device €6.90

Free Version

No

Free Trial

Yes

DriveStrike deployment and support

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)

Deployment

  • Cloud, SaaS, Web-based
  • Mac (Desktop)
  • Windows (Desktop)
  • Android (Mobile)
  • iPhone (Mobile)
  • iPad (Mobile)

Training

  • Live Online
  • Documentation
  • Videos

DriveStrike Features

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Archiving & Retention
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Controls Audit
  • Corrective and Preventive Actions (CAPA)
  • Customisable Reports
  • Customisable Templates
  • Data Visualisation
  • Document Management
  • Document Storage
  • Environmental Compliance
  • FDA Compliance
  • Forms Management
  • HIPAA Compliant
  • ISO Compliance
  • Incident Management
  • Monitoring
  • Multi-Language
  • OSHA Compliance
  • Policy Management
  • Process/Workflow Automation
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Reminders
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Risk Management
  • Role-Based Permissions
  • Sarbanes-Oxley Compliance
  • Security Auditing
  • Surveys & Feedback
  • Task Management
  • Template Management
  • Third Party Integrations
  • Training Management
  • Version Control
  • Workflow Management

View full list of Compliance Software

  • API
  • Access Control
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Best Practices Repository
  • Compliance Management
  • Data Security
  • Data Visualisation
  • Endpoint Protection Software
  • Event Logs
  • Event Tracking
  • Financial Data Protection
  • HIPAA Compliant
  • Incident Management
  • Maintenance Scheduling
  • Monitoring
  • Network Security Software
  • Password Management
  • Patch Management
  • Policy Management
  • Privileged Account Management
  • Real Time Monitoring
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Two-Factor Authentication
  • User Management
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning

View full list of Computer Security Software

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Behaviour Tracking
  • Behavioural Analytics
  • Collaboration Tools
  • Compliance Management
  • Data Visualisation
  • Endpoint Management
  • Event Logs
  • HIPAA Compliant
  • IOC Verification
  • Incident Management
  • Monitoring
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Prioritisation
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Tokenization
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

View full list of Cybersecurity Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Audit Trail
  • Automatic Backup
  • Backup and Recovery
  • Compliance Management
  • Compliance Tracking
  • Compression
  • Configurable Workflow
  • Configuration Management
  • Data Recovery
  • Data Replication
  • Data Storage Management
  • Data Synchronisation
  • Disaster Recovery
  • File Management
  • File Transfer
  • HIPAA Compliant
  • Incident Management
  • Issue Management
  • Monitoring
  • Multiple Data Sources
  • Policy Management
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Notifications
  • Remote Access/Control
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Scheduling
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Sensitive Data Identification
  • Status Tracking
  • Task Scheduling
  • Third Party Integrations
  • User Management
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

View full list of Data Loss Prevention Software

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Application Encryption
  • Audit Trail
  • Authentication
  • Backup and Recovery
  • Cloud Encryption
  • Compliance Management
  • Credential Management
  • Customisable Reports
  • Data Storage Management
  • Data Visualisation
  • Disk Encryption
  • Encryption
  • Event Logs
  • Event Tracking
  • File Encryption
  • HIPAA Compliant
  • Incident Management
  • Issue Tracking
  • Key Management
  • Monitoring
  • P2P Encryption
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Reporting
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Spam Blocker
  • Status Tracking
  • Summary Reports
  • Third Party Integrations
  • Threat Response
  • Tokenization
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning

View full list of Encryption Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anti Virus
  • Application Security
  • Applications Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Behaviour Tracking
  • Behavioural Analytics
  • Compliance Management
  • Customisable Reports
  • Data Visualisation
  • Device Management
  • Encryption
  • Event Logs
  • Event Tracking
  • HIPAA Compliant
  • Incident Management
  • Monitoring
  • Patch Management
  • Policy Management
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Signature Matching
  • Summary Reports
  • Third Party Integrations
  • Two-Factor Authentication
  • Uptime Reporting
  • User Management
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting

View full list of Endpoint Protection Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Archiving & Retention
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Collaboration Tools
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Customisable Forms
  • Customisable Reports
  • Customisable Templates
  • Data Import/Export
  • Data Security
  • Document Management
  • Document Storage
  • Document Templates
  • Documentation Management
  • Drag & Drop
  • For Healthcare
  • HIPAA Compliant
  • Incident Management
  • Monitoring
  • PCI Compliance
  • Policy Management
  • Policy Training
  • Real Time Reporting
  • Remediation Management
  • Reminders
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Risk Management
  • Sarbanes-Oxley Compliance
  • Search/Filter
  • Secure Data Storage
  • Security Auditing
  • Self Service Portal
  • Task Management
  • Third Party Integrations
  • Training Management
  • User Management
  • Vendor Management
  • Version Control
  • Vulnerability Scanning
  • Workflow Management

View full list of HIPAA Compliance Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Asset Management
  • Asset Tracking
  • Audit Management
  • Audit Trail
  • Barcode / Ticket Scanning
  • Change Management
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Configuration Management
  • Contract/License Management
  • Cost Tracking
  • Customisable Branding
  • Customisable Forms
  • Customisable Reports
  • Customizable Fields
  • Dashboard Creation
  • Data Import/Export
  • Data Visualisation
  • Email Management
  • IT Asset Tracking
  • Incident Management
  • Inventory Management
  • Inventory Tracking
  • Knowledge Base Management
  • Maintenance Management
  • Maintenance Scheduling
  • Monitoring
  • Prioritisation
  • Problem Management
  • Procurement Management
  • Real Time Reporting
  • Reporting & Statistics
  • Reporting/Analytics
  • Requisition Management
  • Role-Based Permissions
  • Self Service Portal
  • Service Level Agreement (SLA) Management
  • Supplier Management
  • Support Ticket Management
  • Support Ticket Tracking
  • Task Management
  • Third Party Integrations
  • User Management
  • Workflow Management

View full list of IT Asset Management Software

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Applications Management
  • Asset Management
  • Audit Management
  • Automatic User/Device Recognition
  • Compliance Management
  • Configuration Management
  • Content Management
  • Customisable Branding
  • Customisable Reports
  • Data Management
  • Deployment Management
  • Endpoint Management
  • Enrollments/Onboarding
  • Geolocation
  • IT Asset Tracking
  • Inventory Management
  • Kiosk Mode
  • Location Tracking
  • Mobile Content Management
  • Monitoring
  • Patch Management
  • Policy Management
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Update / Installation
  • Reporting & Statistics
  • Reporting/Analytics
  • SSL Security
  • Secure Data Storage
  • Security Management
  • Self Service Portal
  • Single Sign On
  • Software Management
  • Synchronisation Scheduling
  • Third Party Integrations
  • Two-Factor Authentication
  • Usage Tracking/Analytics
  • User Management
  • Wireless Internet Access
  • Wireless Troubleshooting

View full list of Mobile Device Management Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anti Virus
  • Assessment Management
  • Asset Discovery
  • Asset Tagging
  • Audit Management
  • Audit Trail
  • Authentication
  • Compliance Management
  • Customisable Reports
  • Data Visualisation
  • Email Alerts
  • Event Logs
  • Event Tracking
  • HIPAA Compliant
  • Incident Management
  • Monitoring
  • Network Scanning
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Prioritisation
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Risk Management
  • Role-Based Permissions
  • Search/Filter
  • Security Auditing
  • Server Monitoring
  • Status Tracking
  • Third Party Integrations
  • Two-Factor Authentication
  • User Management
  • Vulnerability Assessment
  • Vulnerability Scanning
  • Web Scanning

View full list of Vulnerability Management Software

DriveStrike Alternatives

More DriveStrike alternatives

DriveStrike Reviews for UK Users

Read all reviews

Overall rating

5/5

Average score

Ease of Use 5
Customer Service 5
Features 4.8
Value for Money 5

Review software

Share your experiences with other software buyers.

Write a Review!
David M.
Technical Services Administrator
Financial Services, 1,001-5,000 Employees
Used the Software for: 1-5 months
  • Overall Rating
    5 /5
  • Ease of Use
    5 /5
  • Features & Functionality
    5 /5
  • Customer Support
    5 /5
  • Value for Money
    5 /5
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 26/09/2019

"Where Did Our Laptops Go?"

Comments: We are now able to wipe any laptop that is not sent back to us after a mobile employee in another state does not return.

Pros: Since about 95% of our laptops are used by mobile users in 6 states we had a hard time tracking them down when the user was no longer with the company. We now have a way to render them useless if we can get them back. We are also using the software as a third piece of software to keep track of our hardware inventory for our accounting office.

Cons: Right now we see none other than maybe difficulty in deploying through GPO.

  • Reviewer Source 
  • Reviewed on 26/09/2019
Kao X.
IT coordinator
Logistics & Supply Chain, 51-200 Employees
Used the Software for: 1-5 months
  • Overall Rating
    5 /5
  • Ease of Use
    5 /5
  • Features & Functionality
    5 /5
  • Customer Support
    5 /5
  • Value for Money
    5 /5
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 20/03/2020

"My review of drivestrike"

Comments: Overall experience is great.

Pros: Ease of use for the software and great customer service is what makes me like it so much.

Cons: In the dashboard, I wish I could customize how I see the list of computers. For example instead of one big list it would easier to just have 4 list smaller list that are separated by group assignment.

  • Reviewer Source 
  • Reviewed on 20/03/2020
Alejandro C.
Multimedia Artist
Media Production, Self Employed
Used the Software for: 6-12 months
  • Overall Rating
    5 /5
  • Ease of Use
    5 /5
  • Features & Functionality
    5 /5
  • Customer Support
    5 /5
  • Value for Money
    5 /5
  • Likelihood to Recommend
    8/10
  • Reviewer Source 
  • Reviewed on 11/03/2020

"Peace of Mind for Anyone Who Wants it"

Comments: DriveStrike is mighty cheap, self-explanatory, and will be my first aid when I finally lose my phone. It's a great app all around!

Pros: As a single user, DriveStrike proves the most beneficial on my Pixel 4. The software's remote locate, lock and wipe functions keep me from feeling anxious about the possibility of losing my phone and compromising my contacts, photos, and stored passwords on my Chrome browser. I ride public transportation often and I fear the day I forget my phone—or my wallet—on the seat. For $1.50 per month, I am happy to know I can erase the contents of my phone directly from my computer if that day ever comes. As for my wallet, I am still waiting on a really smart wallet that locks automatically—somehow.

Cons: At first I was a little hesitant to install software that grants a remote wipe function on my phone, but I think that's a common feeling for anyone who worries about privacy. In reality, I had nothing to be concerned about.

  • Reviewer Source 
  • Reviewed on 11/03/2020
Joseph J.
Managing Analyst
Banking, 51-200 Employees
Used the Software for: 1+ year
  • Overall Rating
    5 /5
  • Ease of Use
    5 /5
  • Features & Functionality
    5 /5
  • Customer Support
    5 /5
  • Value for Money
    5 /5
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 23/08/2019

"Incredibly cost effective"

Comments: DriveStrike is the perfect solution for data protection. It's a rugged software that doesn't bloat the device at all. You won't recognize it's there which is perfect for day to day use. If any issues arise, the Dashboard can almost instantly locate, lock, or wipe the device. Quite the nifty set of features for the privacy concerns facing our company. We recommend this to everyone in the space who values privacy.

Pros: Fast setup. Easy to control devices from the dashboard. Quick and friendly support.

Cons: There is not much to complain about this software. It has served our company well and hasn't caused any issues.

  • Reviewer Source 
  • Reviewed on 23/08/2019
Paul B.
CIO
Capital Markets, 1,001-5,000 Employees
Used the Software for: 6-12 months
  • Overall Rating
    5 /5
  • Ease of Use
    5 /5
  • Features & Functionality
    5 /5
  • Customer Support
    5 /5
  • Value for Money
    5 /5
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 01/05/2019

"Super responsive and friendly support, easy to install and understand"

Comments: Remotely wiping and securing your data is a snap with DriveStrike and their customer support is superb. I was blown away by how helpful, responsive, and knowledgeable they are. They even went out of their way to help me with unrelated issues.

Pros: The ease of installation and use is fantastic. All the features work as you would expect on all major platforms.

Cons: Locating Apple devices precisely requires that you place the devices in supervised mode or purchase them from Apple directly using the DEP (Device Enrollment Program) which is annoying but a function of Apple requirements.

  • Reviewer Source 
  • Reviewed on 01/05/2019