Solved

Remote Security Software

Posted on 2012-04-11
3
437 Views
Last Modified: 2012-04-17
We have many remote users who use laptops and for corporate policy we need to find a 3rd party application that will allow the IT department to remotely access any and all data on those laptops and to remotely wipe and\or disable the laptop at any time.
Anyone know of good solutions for this? Thanks.
0
Comment
Question by:tolinrome
3 Comments
 
LVL 14

Accepted Solution

by:
grimkin earned 167 total points
ID: 37836792
Hi,

There are a fair few solutions for this now:

On an enterprise level you may want to look at something like Druva inSync or DiskAgent which incorporates geo-location, backup and remote wipe.

http://www.druva.com/insync/

https://www.diskagent.com/

For small offices, locatemylaptopprovide a budget service - http://www.locatemylaptop.com/

HTH
0
 
LVL 63

Assisted Solution

by:btan
btan earned 167 total points
ID: 37837763
Just to share in context of protection of remote machine with combination below

1. Prey\Lojack, that allows you to track the machine if the user connects to the internet.
 http://www.absolute.com/lojackforlaptops/features
 http://preyproject.com/

2. A 2nd HD partition, or encrypted folder, using truecrypt. You should not mount this automatically but mount it yourself with a strong password. This device level and not management centralization available.
 http://www.tech.ie/stolen-laptop-risks
0
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 166 total points
ID: 37849416
PGP WDE 10 knows remote wipe, too. In my opinion, we don't need remote wiping if the data is encrypted using strong passwords. Remember that remote wipe won't work if the hard drive is taken out of the laptop.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question