New service deletes files on stolen laptops
But the thief would have to connect to the Internet without wiping data first
TechWorld.com - Everdream Corp. has launched a service to delete or encrypt files on stolen PCs and laptops. But the service depends utterly on the thief being naive enough to connect the stolen PC/laptop to the Internet without wiping the existing software on the hard drive first.
The Everdream software is implemented as an agent on the PC or laptop. When the device is stolen and is connected to the Internet, the agent software links to Everdream's control center and sends a set of network location information.
This triggers the sending of software from the control center to automatically encrypt or delete files on the stolen device. Customers of Everdream's Theft Recovery Service set policies to say whether files should be deleted or encrypted and which files are to be targeted.
This service is in addition to Everdream's existing set of corporate PC management services for things such as online backup.
The Fremont, Calif., company says that the network location information can assist law enforcement agencies in tracking the stolen box. In the U.K., it is debatable if the police would do anything other than provide a theft reference number if a PC was stolen.
If a thief reformats the hard drive of the stolen PC or laptop, then the service won't work. Also, if the thief does not connect to the Internet at all, then all the files on the hard drive could be copied at leisure.
Everdream does not say how the software recognizes the theft. The service costs $6 per PC per month in the U.S. -- assume ¿5.00 or so in the U.K.
- Leverage the Power of APIs to Turbocharge Your Mobile Strategy: 7 Steps to a Successful API Program In this guide, Intel® Services-which offers industry-leading API management solutions for over 150 top enterprises, including Best Buy, Netflix, Expedia, ESPN, and The...
- Mission Critical Cloud Powers Freesat Website, Mobile App When subscription-free satellite TV service Freesat needed a scalable, cost-effective infrastructure it found the disaster recovery and security features it needed with Peer...
- Bring Your Own Device: From Security to Success Download this e-Book to learn best practices for executing a BYOD policy.
- Securing Mobile App Data - Comparing Containers and App Wrappers Analysts agree that Mobile Device Management (MDM) is not enough when it comes to securing app data. Although it remains a critical component...
- API Management: The Key to Improving the Consumer Travel Experience Join PhoCusWright's Senior Technology Analyst, Norm Rose, as he shares his insights on how travel suppliers and intermediaries can improve industry data flow...
- Don't Believe the Hype: Not All Containers are Created Equal Hear executives discuss the 3 C's of Secure Mobility-content, credentials, and configurations-and learn the inherent security risks to your organization of using MDM... All Mobile/Wireless White Papers | Webcasts