DriveStrike

By Spearstone

Re-claim Profile

Unlock access to DriveStrike profile for Free

Your G2 page is often the first place buyers evaluate you. Take control of how your brand shows up

WHAT YOU UNLOCK

Control your profile

Update logo, screenshots, pricing info

Engage with customers

Respond to reviews, build trust with prospects

See buyer activity

Track who’s viewing, understand engagement

Collect reviews

Create landing page and collect reviews

Sellers who actively manage their G2 profile build more trust and convert more buyers

4.5 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with DriveStrike?

It's been two months since this profile received a new review
Leave a Review
Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

DriveStrike Reviews & Product Details

Product Avatar Image

Have you used DriveStrike before?

Answer a few questions to help the DriveStrike community

DriveStrike Reviews (2)

Reviews

DriveStrike Reviews (2)

4.5
2 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Adrián A.
AA
Funcionario de carrera en Dpto Informática Tributaria en Agencia Tributaria
Small-Business (50 or fewer emp.)
"The security tool I use"
What do you like best about DriveStrike?

In our company, we use computers in different countries and this app helps us to lock the computers when someone stops working with us. This had always been a problem and with DriveStrike we have solved it. The customer service is very efficient. Review collected by and hosted on G2.com.

What do you dislike about DriveStrike?

We had some issues with the initial installation, but customer service helped us quickly. The design of the initial panel seems very basic to me, and I think it could have a more attractive design. Review collected by and hosted on G2.com.

NV
Recruitment Consultant
Small-Business (50 or fewer emp.)
"DriveStrike"
What do you like best about DriveStrike?

Simple-to-operate software. I appreciate that you can remotely delete a device by logging into the administrative interface and turning off the computer in case it is stolen and the data is not stolen. Review collected by and hosted on G2.com.

What do you dislike about DriveStrike?

The software accomplishes exactly what it says it will, and it does so quickly and effectively. so i would not say there is any dislike on my side. Review collected by and hosted on G2.com.

There are not enough reviews of DriveStrike for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Symantec End-user Endpoint Security Logo
Symantec End-user Endpoint Security
4.4
(552)
Proactively detect and block today's most advanced threats with an endpoint protection solution that goes beyond antivirus.
2
Absolute Secure Endpoint Logo
Absolute Secure Endpoint
4.6
(407)
Absolute accelerates its customers’ shift to work-from-anywhere through the industry’s first self-healing Zero Trust platform, helping to ensure maximum security and uncompromised productivity. Absolute is the only solution embedded in more than half a billion devices, offering a permanent digital connection that intelligently and dynamically applies visibility, control and self-healing capabilities to endpoints, applications, and network access to help ensure their cyber resilience tailored for distributed workforces.
3
ThreatDown Logo
ThreatDown
4.6
(1,083)
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users.
4
Microsoft System Center Logo
Microsoft System Center
4.1
(587)
Microsoft System Center helps customers realize the benefits of the Microsoft Cloud Platform by delivering unified management. Experience fast time-to-value with out-of-the-box monitoring, provisioning, configuration, automation, protection and self-service.
5
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(386)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
6
TeamViewer Logo
TeamViewer
4.5
(3,805)
Easy-to-use remote support and access software that lets you securely connect to and monitor desktop-to-desktop, desktop-to-mobile, mobile-to-mobile, or to unattended devices like servers and IoT devices from anywhere.
7
NinjaOne Logo
NinjaOne
4.7
(3,834)
NinjaOne unifies IT to simplify work for 35,000+ customers in 140+ countries. The NinjaOne Unified IT Operations Platform delivers endpoint management, autonomous patching, backup, and remote access in a single console to improve efficiency, increase resilience, and reduce spend. Intelligent automation and human-centered AI gives employees a great technology experience.
8
Jamf Logo
Jamf
4.7
(2,097)
A complete Apple management solution for IT pros to empower users and simplify the deployment, inventory, and security of Macs, iPads, and iPhones. Designed to automate device management for you while driving end-user productivity and creativity, Jamf Pro (formerly Casper Suite) is the EMM tool that delights IT pros and the users they support by delivering on the promise of unified endpoint management for Apple devices.
9
Acronis Cyber Protect Cloud Logo
Acronis Cyber Protect Cloud
4.7
(1,316)
Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating costs. Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware (including anti-virus, anti-ransomware, and anti-cryptojacking) and security and management capabilities such as vulnerability assessments, patch management, URL filtering and more. Now, service providers can eliminate complexity and make security a centerpiece of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Get upgraded security with integrated AI-based defenses that protect clients from modern threats, make smarter use of resources so your team can focus on clients, and earn new recurring revenue and higher margins that strengthen your business. Enriched with next-gen, full-stack anti-malware protection and comprehensive yet simple management tools, built on top of our industry-leading backup and data recovery solution, Acronis Cyber Protect Cloud simplifies onboarding, daily operations, and reporting, and combats advanced attacks with new use cases enabled by integration. Acronis Cyber Protect Cloud makes it easy to deliver the modern cyber protection your clients seek.
10
Atera Logo
Atera
4.6
(1,085)
Atera offers an all-in-one IT management platform that combines Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automation tools, providing efficient infrastructure management, enhanced service quality, and comprehensive features like patch management and AI-driven analytics, all under a transparent per-technician pricing model.
Show More

Questions about DriveStrike? Ask real users or explore answers from the community

Get practical answers, real workflows, and honest pros and cons from the G2 community or share your insights.

GU
Guest User

What is DriveStrike used for?

Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
DriveStrike