Solved

end to end encryption and remote wipe

Posted on 2016-08-08
2
82 Views
Last Modified: 2016-08-11
Hi,

I am looking for suggestions for a solution for one of my clients, there is a need to encrypt all data from local and cloud backups through to pc's and laptops, and have the ability to remote wipe if necessary, preferably all managed through a web portal. Any suggestion as to well established companies that supply that service would be appreciated.

Best
0
Comment
Question by:markflexman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 18

Accepted Solution

by:
Mal Osborne earned 250 total points
ID: 41746761
For the "remote wipe" capability, I would only look at Absolute. I tried this out a while back, once the Absolute client is installed, it is REALLY difficult to uninstall. Removing the hard drive and installing a new OS on a virgin one won't even get rid of the agent. They also do geolocation quite well, even without GPS hardware, that can be a useful feature.

https://www.absolute.com/en
1
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 250 total points
ID: 41747071
I was going to mention the same: LoJack by absolute: http://lojack.absolute.com/
But please note that once the hard drive gets removed, there is no way to wipe it from remote, since this super-duper persistence technology is embedded into the firmware of the laptop/tablet, not the hard drive's firmware, so it remains NO protection.

You will need to enforce strong encryption passwords, that's all. Remote Wipe sounds nice but only helps if the thieve leaves the drive in place.
1

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cloud Security  - encryption needed? 6 106
Review of apps API SSL Cert policy 2 55
JAVA API design with micro service cloud in mind 1 109
Data Encryption 3 66
Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
Businesses who process credit card payments have to adhere to PCI Compliance standards. Here’s why that’s important.
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…
Delivering innovative fully-managed cloud services for mission-critical applications requires expertise in multiple areas plus vision and commitment. Meet a few of the people behind the quality services of Concerto.

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question