Solved

Tracking software for laptop

Posted on 2013-06-25
2
308 Views
Last Modified: 2013-07-23
Hello
Does anyone know of best solution to track laptops. We would like to monitor if laptop is stolen and maybe have ability to remote wipe the laptop if necessary.

Thank you

CP
0
Comment
Question by:CProp
2 Comments
 
LVL 24

Assisted Solution

by:aadih
aadih earned 125 total points
ID: 39275849
0
 
LVL 4

Accepted Solution

by:
thelug earned 125 total points
ID: 39275988
We used computrace and lojack for laptops.  They helped us repote wipe, but the stolen devices couldn't be recovered once they hit the internet (after we triggered the wipe)  Newer Dell Models have support for computrace baked in to the BIOS.  This means that the device becomes a brick because no matter what is done short of changing the motherboard, anytime the device hits the net, the wipe command is reissued.

The one caviet we ran into though, was that if we chose to remote wipe the lappy, we lost the ability to track it from that point forward as it loses the agent which prevents the device from phoning home.

There is the more conumer geared lojack for laptops which will enable remote file deletion...not remote wipe.

Info on both products is available here:
http://www.absolute.com/en
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Can I use playfile with the newer tool ICACL? WHat would be the command? 12 93
Do we need servers??? 5 190
IT Contract Fee 17 132
string for security 3 74
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringin…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now