Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at DriveStrike, reclaim access to make changes.
Product Avatar Image
DriveStrike

By Spearstone

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at DriveStrike, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.5 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with DriveStrike?

It's been two months since this profile received a new review
Leave a Review

DriveStrike Reviews & Product Details

Product Avatar Image

Have you used DriveStrike before?

Answer a few questions to help the DriveStrike community

DriveStrike Reviews (2)

Reviews

DriveStrike Reviews (2)

4.5
2 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Adrián A.
AA
Funcionario de carrera en Dpto Informática Tributaria en Agencia Tributaria
Small-Business (50 or fewer emp.)
"The security tool I use"
What do you like best about DriveStrike?

In our company, we use computers in different countries and this app helps us to lock the computers when someone stops working with us. This had always been a problem and with DriveStrike we have solved it. The customer service is very efficient. Review collected by and hosted on G2.com.

What do you dislike about DriveStrike?

We had some issues with the initial installation, but customer service helped us quickly. The design of the initial panel seems very basic to me, and I think it could have a more attractive design. Review collected by and hosted on G2.com.

NV
Recruitment Consultant
Small-Business (50 or fewer emp.)
"DriveStrike"
What do you like best about DriveStrike?

Simple-to-operate software. I appreciate that you can remotely delete a device by logging into the administrative interface and turning off the computer in case it is stolen and the data is not stolen. Review collected by and hosted on G2.com.

What do you dislike about DriveStrike?

The software accomplishes exactly what it says it will, and it does so quickly and effectively. so i would not say there is any dislike on my side. Review collected by and hosted on G2.com.

There are not enough reviews of DriveStrike for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Symantec End-user Endpoint Security Logo
Symantec End-user Endpoint Security
4.4
(550)
Proactively detect and block today's most advanced threats with an endpoint protection solution that goes beyond antivirus.
2
Absolute Secure Endpoint Logo
Absolute Secure Endpoint
4.6
(407)
Absolute accelerates its customers’ shift to work-from-anywhere through the industry’s first self-healing Zero Trust platform, helping to ensure maximum security and uncompromised productivity. Absolute is the only solution embedded in more than half a billion devices, offering a permanent digital connection that intelligently and dynamically applies visibility, control and self-healing capabilities to endpoints, applications, and network access to help ensure their cyber resilience tailored for distributed workforces.
3
ThreatDown Logo
ThreatDown
4.6
(1,073)
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users.
4
Microsoft System Center Logo
Microsoft System Center
4.1
(585)
Microsoft System Center helps customers realize the benefits of the Microsoft Cloud Platform by delivering unified management. Experience fast time-to-value with out-of-the-box monitoring, provisioning, configuration, automation, protection and self-service.
5
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.6
(379)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
6
NinjaOne Logo
NinjaOne
4.7
(3,413)
NinjaOne, the automated endpoint management platform, delivers real-time visibility, security, and control over all endpoints to increase productivity for more than 20,000 customers.
7
Jamf Logo
Jamf
4.8
(2,087)
A complete Apple management solution for IT pros to empower users and simplify the deployment, inventory, and security of Macs, iPads, and iPhones. Designed to automate device management for you while driving end-user productivity and creativity, Jamf Pro (formerly Casper Suite) is the EMM tool that delights IT pros and the users they support by delivering on the promise of unified endpoint management for Apple devices.
8
ManageEngine Endpoint Central Logo
ManageEngine Endpoint Central
4.5
(1,041)
Endpoint Central is an integrated desktop and mobile device management software that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
9
Atera Logo
Atera
4.6
(1,015)
Atera offers an all-in-one IT management platform that combines Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automation tools, providing efficient infrastructure management, enhanced service quality, and comprehensive features like patch management and AI-driven analytics, all under a transparent per-technician pricing model.
10
Action1 Logo
Action1
4.9
(844)
Action1 reinvents patching with an infinitely scalable, highly secure, cloud-native platform configurable in 5 minutes — it just works and is always free for the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted by thousands of enterprises managing millions of endpoints globally, Action1 is certified for SOC and ISO 7001. The company is founder-led by industry veterans Alex Vovk and Mike Walters, who founded Netwrix, which has grown into a multi-billion-dollar industry-leading cybersecurity company.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
DriveStrike