Feeds

GPS tracking slapped on laptop recovery service

Absolute knows where your PC lives

Secure remote control for conventional and virtual desktops

Absolute Software has added GPS tracking to its laptop theft-recovery and asset-tracking service. This will allow asset managers to track laptops to within 10 metres.

The technology will also speed recovery of missing or stolen computers, being easier to use than previous IP address-based tracking technology.

The technology uses embedded GPS receivers to acquire latitude and longitude location information from remote computers. This data, sent when the machines are connected to the internet, is then displayed on Absolute's web-based IT asset management portal, showing the current or historical location of a piece of kit.

Use of the technology means that salesmen may no longer be able to claim that they are visiting client premises rather than sneaking down the pub. The upside is that the lives of managers - particularly in the increasingly frequent cases where laptops are lost or stolen - is made a lot easier.

Other aspects of Computrace allow the remote deletion of sensitive information for regulatory compliance and the detection of hardware changes or prohibited software installations. Absolute's investigative team can be wheeled out to physically recover lost or stolen computers, and to work out what changes have been made to purloined PCs once they are recovered.

Computrace software is embedded in the firmware of computers from the the likes of Dell, HP, Lenovo, Toshiba and Fujitsu. The agent is designed to withstand operating system re-installations, as well as hard-drive reformats, replacements and re-imaging. Subscriptions run for terms ranging from one to four years.

Geolocation tracking is available to Computrace customers at no extra cost on supported GPS receivers (list here). Use of a Qualcomm UNDP-1 (Gobi) wireless module is listed as a system requirement. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Mozilla, EFF, Cisco back free-as-in-FREE-BEER SSL cert authority
Let’s Encrypt to give HTTPS-everywhere a boost in 2015
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.