Solved

Tracking software for laptop

Posted on 2013-06-25
2
315 Views
Last Modified: 2013-07-23
Hello
Does anyone know of best solution to track laptops. We would like to monitor if laptop is stolen and maybe have ability to remote wipe the laptop if necessary.

Thank you

CP
0
Comment
Question by:CProp
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 24

Assisted Solution

by:aadih
aadih earned 125 total points
ID: 39275849
0
 
LVL 4

Accepted Solution

by:
thelug earned 125 total points
ID: 39275988
We used computrace and lojack for laptops.  They helped us repote wipe, but the stolen devices couldn't be recovered once they hit the internet (after we triggered the wipe)  Newer Dell Models have support for computrace baked in to the BIOS.  This means that the device becomes a brick because no matter what is done short of changing the motherboard, anytime the device hits the net, the wipe command is reissued.

The one caviet we ran into though, was that if we chose to remote wipe the lappy, we lost the ability to track it from that point forward as it loses the agent which prevents the device from phoning home.

There is the more conumer geared lojack for laptops which will enable remote file deletion...not remote wipe.

Info on both products is available here:
http://www.absolute.com/en
0

Featured Post

Retailers - Is your network secure?

With the prevalence of social media & networking tools, for retailers, reputation is critical. Have you considered the impact your network security could have in your customer's experience? Learn more in our Retail Security Resource Kit Today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Suggested Courses

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question