Solved

Remote Security Software

Posted on 2012-04-11
3
436 Views
Last Modified: 2012-04-17
We have many remote users who use laptops and for corporate policy we need to find a 3rd party application that will allow the IT department to remotely access any and all data on those laptops and to remotely wipe and\or disable the laptop at any time.
Anyone know of good solutions for this? Thanks.
0
Comment
Question by:tolinrome
3 Comments
 
LVL 14

Accepted Solution

by:
grimkin earned 167 total points
ID: 37836792
Hi,

There are a fair few solutions for this now:

On an enterprise level you may want to look at something like Druva inSync or DiskAgent which incorporates geo-location, backup and remote wipe.

http://www.druva.com/insync/

https://www.diskagent.com/

For small offices, locatemylaptopprovide a budget service - http://www.locatemylaptop.com/

HTH
0
 
LVL 62

Assisted Solution

by:btan
btan earned 167 total points
ID: 37837763
Just to share in context of protection of remote machine with combination below

1. Prey\Lojack, that allows you to track the machine if the user connects to the internet.
 http://www.absolute.com/lojackforlaptops/features
 http://preyproject.com/

2. A 2nd HD partition, or encrypted folder, using truecrypt. You should not mount this automatically but mount it yourself with a strong password. This device level and not management centralization available.
 http://www.tech.ie/stolen-laptop-risks
0
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 166 total points
ID: 37849416
PGP WDE 10 knows remote wipe, too. In my opinion, we don't need remote wiping if the data is encrypted using strong passwords. Remember that remote wipe won't work if the hard drive is taken out of the laptop.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question