Solved

Remote Security Software

Posted on 2012-04-11
3
439 Views
Last Modified: 2012-04-17
We have many remote users who use laptops and for corporate policy we need to find a 3rd party application that will allow the IT department to remotely access any and all data on those laptops and to remotely wipe and\or disable the laptop at any time.
Anyone know of good solutions for this? Thanks.
0
Comment
Question by:tolinrome
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 14

Accepted Solution

by:
grimkin earned 167 total points
ID: 37836792
Hi,

There are a fair few solutions for this now:

On an enterprise level you may want to look at something like Druva inSync or DiskAgent which incorporates geo-location, backup and remote wipe.

http://www.druva.com/insync/

https://www.diskagent.com/

For small offices, locatemylaptopprovide a budget service - http://www.locatemylaptop.com/

HTH
0
 
LVL 64

Assisted Solution

by:btan
btan earned 167 total points
ID: 37837763
Just to share in context of protection of remote machine with combination below

1. Prey\Lojack, that allows you to track the machine if the user connects to the internet.
 http://www.absolute.com/lojackforlaptops/features
 http://preyproject.com/

2. A 2nd HD partition, or encrypted folder, using truecrypt. You should not mount this automatically but mount it yourself with a strong password. This device level and not management centralization available.
 http://www.tech.ie/stolen-laptop-risks
0
 
LVL 55

Assisted Solution

by:McKnife
McKnife earned 166 total points
ID: 37849416
PGP WDE 10 knows remote wipe, too. In my opinion, we don't need remote wiping if the data is encrypted using strong passwords. Remember that remote wipe won't work if the hard drive is taken out of the laptop.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Many of you may be aware of the recent Google Docs scam emails that have been floating around coming from various people that you know. Here's a guide on identifying How To Identify the Scam Email You will see an email from someone you’ve had co…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question