The data deletion feature, if activated, requires a one-time hit of about $200, but that’s well worth it if the data is important and confidential. Logon scripts are supported.ĭisadvantages: You must subscribe to this software, which means a hit to that ever-shrinking IT budget each and every year. The small software program plays ball well with antivirus programs such as McAfee VirusScan, Symantec Norton AntiVirus and Trend Micro PC-cillin, although it’s a good idea to disable that software during the installation, and then re-enable it. In addition to the built-in remote tracking, you also can call Absolute and have them track the computer and communicate with local authorities to recover the machine. The application resides in the partition group and can survive normal attempts to clean up the hard drive.Ĭompatible with any current file-level encryption products, the product will prevent hackers from getting into sensitive data stores. The client calls the monitoring center once a day - every 15 minutes if the notebook has been reported stolen. For a number of newer Hewlett-Packard and Gateway notebooks, the software program can be wedged into the BIOS, making it even harder for the bad guys to detect or tamper with. Absolute lojack recovery removal install#Why Computrace works for IT: Simply install a small hard-to-detect persistent software program that communicates with a central server over the Internet. Absolute lojack recovery removal upgrade#The software also helps with regulatory compliance because it allows IT to store purchase and upgrade dates, notebook hardware specifications, location data and end-user history. Computrace wipes the disk clean by overwriting the data seven times, bit by bit, using an algorithm that meets the NATO deletion standard and exceeds Defense Department standards. If the notebook is lost or stolen, you can activate the software over the Internet to wipe clean the data selected for removal. But they will sleep better knowing that the sensitive data on a notebook PC left at the airport isn’t falling into the wrong hands. What happens if someone hijacks or steals your computer? Wouldn’t it be nice if information technology could wipe all the data off that machine remotely and then help you recover the stolen notebook using a built-in homing beacon? That’s exactly what ComputraceComplete from Absolute Software does.Įnd-user advantages: Taking up only 8 kilobytes of memory, this techie LoJack will go unnoticed by your road warriors.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |