Solved

Remote Security Software

Posted on 2012-04-11
3
438 Views
Last Modified: 2012-04-17
We have many remote users who use laptops and for corporate policy we need to find a 3rd party application that will allow the IT department to remotely access any and all data on those laptops and to remotely wipe and\or disable the laptop at any time.
Anyone know of good solutions for this? Thanks.
0
Comment
Question by:tolinrome
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 14

Accepted Solution

by:
grimkin earned 167 total points
ID: 37836792
Hi,

There are a fair few solutions for this now:

On an enterprise level you may want to look at something like Druva inSync or DiskAgent which incorporates geo-location, backup and remote wipe.

http://www.druva.com/insync/

https://www.diskagent.com/

For small offices, locatemylaptopprovide a budget service - http://www.locatemylaptop.com/

HTH
0
 
LVL 63

Assisted Solution

by:btan
btan earned 167 total points
ID: 37837763
Just to share in context of protection of remote machine with combination below

1. Prey\Lojack, that allows you to track the machine if the user connects to the internet.
 http://www.absolute.com/lojackforlaptops/features
 http://preyproject.com/

2. A 2nd HD partition, or encrypted folder, using truecrypt. You should not mount this automatically but mount it yourself with a strong password. This device level and not management centralization available.
 http://www.tech.ie/stolen-laptop-risks
0
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 166 total points
ID: 37849416
PGP WDE 10 knows remote wipe, too. In my opinion, we don't need remote wiping if the data is encrypted using strong passwords. Remember that remote wipe won't work if the hard drive is taken out of the laptop.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
What is the goal of SOC2 compliance? 4 49
Certificate Questions - Exchange 2016 11 40
wifi security 11 39
sample of wannacry 3 144
Most MSPs worth their salt are already offering cybersecurity to their customers. But cybersecurity as a service is wide encompassing and can mean many things.  So where are MSPs falling in this spectrum?
Ransomware continues to grow in reach and sophistication, putting data everywhere at risk. Learn how to avoid being caught in its sinister clutches with these 11 key tips.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question