Solved

Remote Security Software

Posted on 2012-04-11
3
435 Views
Last Modified: 2012-04-17
We have many remote users who use laptops and for corporate policy we need to find a 3rd party application that will allow the IT department to remotely access any and all data on those laptops and to remotely wipe and\or disable the laptop at any time.
Anyone know of good solutions for this? Thanks.
0
Comment
Question by:tolinrome
3 Comments
 
LVL 14

Accepted Solution

by:
grimkin earned 167 total points
ID: 37836792
Hi,

There are a fair few solutions for this now:

On an enterprise level you may want to look at something like Druva inSync or DiskAgent which incorporates geo-location, backup and remote wipe.

http://www.druva.com/insync/

https://www.diskagent.com/

For small offices, locatemylaptopprovide a budget service - http://www.locatemylaptop.com/

HTH
0
 
LVL 62

Assisted Solution

by:btan
btan earned 167 total points
ID: 37837763
Just to share in context of protection of remote machine with combination below

1. Prey\Lojack, that allows you to track the machine if the user connects to the internet.
 http://www.absolute.com/lojackforlaptops/features
 http://preyproject.com/

2. A 2nd HD partition, or encrypted folder, using truecrypt. You should not mount this automatically but mount it yourself with a strong password. This device level and not management centralization available.
 http://www.tech.ie/stolen-laptop-risks
0
 
LVL 53

Assisted Solution

by:McKnife
McKnife earned 166 total points
ID: 37849416
PGP WDE 10 knows remote wipe, too. In my opinion, we don't need remote wiping if the data is encrypted using strong passwords. Remember that remote wipe won't work if the hard drive is taken out of the laptop.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Three simple tips to quickly and efficiently back up and protect the contents of your PC and Mac®.
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now