Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

end to end encryption and remote wipe

Posted on 2016-08-08
2
69 Views
Last Modified: 2016-08-11
Hi,

I am looking for suggestions for a solution for one of my clients, there is a need to encrypt all data from local and cloud backups through to pc's and laptops, and have the ability to remote wipe if necessary, preferably all managed through a web portal. Any suggestion as to well established companies that supply that service would be appreciated.

Best
0
Comment
Question by:markflexman
2 Comments
 
LVL 18

Accepted Solution

by:
Mal Osborne earned 250 total points
ID: 41746761
For the "remote wipe" capability, I would only look at Absolute. I tried this out a while back, once the Absolute client is installed, it is REALLY difficult to uninstall. Removing the hard drive and installing a new OS on a virgin one won't even get rid of the agent. They also do geolocation quite well, even without GPS hardware, that can be a useful feature.

https://www.absolute.com/en
1
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 250 total points
ID: 41747071
I was going to mention the same: LoJack by absolute: http://lojack.absolute.com/
But please note that once the hard drive gets removed, there is no way to wipe it from remote, since this super-duper persistence technology is embedded into the firmware of the laptop/tablet, not the hard drive's firmware, so it remains NO protection.

You will need to enforce strong encryption passwords, that's all. Remote Wipe sounds nice but only helps if the thieve leaves the drive in place.
1

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cloud computing 4 122
Need to open a hard disk on a Mac 16 131
Recommendations for cloud-based web filtering 4 114
Implementing BitLocker on domain laptop remotely gives TPM error 21 40
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
Delivering innovative fully-managed cloud services for mission-critical applications requires expertise in multiple areas plus vision and commitment. Meet a few of the people behind the quality services of Concerto.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question