Feeds

Intel, Lenovo to foil laptop thieves

Absolute security

The Essential Guide to IT Transformation

Chip maker Intel, computer manufacturer Lenovo, and security-software publisher Absolute Software today announced a joint program to equip select Lenovo laptops with anti-theft technology.

Intel's Anti-Theft PC Protection hardware, part of the vPro Technology component of the Centrino 2 platform, will enable IT staffers to protect suitably equipped Lenovo T400 14.1-inch laptops through subscriptions to Absolute's Computrace security-software service. Although the announced security capabilities will be built into the T400s, their activation — and the Computrace subscription — will be optional.

According to Bob Galush, Lenovo's vice president for software and peripherals marketing, this hardware/software one-two punch will enable IT departments to "be confident their business notebook PCs are protected by an additional layer of security."

On paper, at least, Galush seems to have reason to exude his own confidence. As described in coordinated press releases from the three companies, an IT admin can choose to configure the anti-theft technology to lock an individual laptop if it fails to "check in" over the internet to the Absolute Monitoring Center within a specified period of time. Alternatively, if a laptop is reported stolen, an admin can designate it to be locked the next time it checks in.

Even without a Computrace subscription, the Intel Anti-Theft PC Protection hardware can lock a laptop after a predetermined number of failed password attempts or if it fails to check in after a predetermined period of time. If and when a stolen laptop is returned to its rightful owner, an admin can then unlock it.

Interestingly, the capabilities outlined by Intel, Lenovo, and Absolute stop short of those demonstrated in the anti-theft demo that Intel execs presented during the Intel Developer Forum in August of this year. In that demo, security measures included remote file encryption and the ability to snap a photo of the laptop-thieving miscreant using the stolen machine's webcam and then automatically email that image of the evildoer back to the laptop's corporate home. Perhaps these powers will appear in verion 2.0.

The first security-enhanced T400s will ship later this month — so if your personal finances are based on laptop-lifting larceny, it's time to step up your efforts. Or, at minimum, avoid Lenovo T400s. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.