Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

Remote data salvage from stolen laptops

Absolute Software : 24 September, 2008  (New Product)
Computrace from Absolute Software now includes the ability for data to be recovered remotely from laptops that have been lost or stolen
Absolute Software is adding Emergency Remote Data Retrieval capabilities to its industry-leading laptop management suite Computrace.

When a computer is stolen, Absolute's customers will be able to specify sensitive files on the computer, securely retrieve them remotely and then execute an emergency data delete operation to ensure the files do not fall into the wrong hands.

'We are always in search of new capabilities to assist our customers when they suffer the loss or theft of a computer,' said John Livingston, Chairman and CEO of Absolute Software. "In providing theft recovery services for more than ten years, we have learnt that mobile computers tend to go missing when our customers least expect it.

"Often, these computers contain sensitive information or unique documents that are not saved anywhere else. Ask yourself, how often you back up your own files, and you will get a sense for how often this is the case - particularly for regular business travellers. Delivering the ability to select these files, remotely retrieve them and then delete them from a stolen computer is a major pillar in the ultimate mobile computer management and security system.'

With this new service, Absolute customers will have a wider range of services available, both as theft deterrents and for post-theft mitigation.

Pre-theft management capabilities include the ability to:.

* Inventory computers that are in the field, disconnected from the LAN.
* Report on installed software, software installations and hardware changes.
* Check antivirus and encryption software status remotely.
* Track leased computers to ensure timely returns.
* Deter theft through loss control and policy management.

Post-theft damage mitigation capabilities include the ability to:.

* Now remotely retrieve sensitive files prior to remote deletion.
* Physically recover missing computers and gather evidence for prosecution.
* Remotely delete sensitive information.
* Determine whether sensitive files have been accessed by thieves.
* Remotely disable stolen computers, making them useless to thieves.

Livingston added, "As the proven leading provider of emergency services for lost or stolen computers, our customers have the ability to choose the level of response appropriate for their unique situation - everything from recovering the computer and determining who stole it to remotely deleting any sensitive data. With this new service, customers will be able to retrieve their files so they can remain productive while Absolute performs additional emergency services."
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo