Technology Reseller v26
46 Information Technology for Small to Medium-sized Businesses EXO 5 – Everything you need to run a more secure laptop fleet Track laptops and mobile devices, counteract theft, secure sensitive data, and stay compliant with data privacy standards. All with a single cloud-based console. Laptop and Device Tracking Track and locate laptops, smartphones and tablets across your organisation in real-time. Real-time agent The EXO5 agent uses a persistent and secure connection to provide asset inventory, geolocation and command execution in real-time. Information is always up-to-date, which is critical in a developing theft scenario. Ultra-accurate location EXO5 uses multiple methods to locate assets to provide the best location accuracy worldwide including wi-fi and cellular triangulation, GPS, MAC address correlation, and IP address databases frommultiple providers. Dynamic maps Use the Google Maps interface to quickly locate assets, or the real- time LiveMap and Google Earth display for a commanding view of your entire organisation. RemoteKill® Prevent asset and data theft with essential anti-theft countermeasures. RemoteKill® file encryption Data on a compromised asset can be quickly encrypted, protecting it from unauthorized users. RemoteKill encryption works out-of-band, meaning data can even be protected from previously authorised users such as terminated employees. RemoteKill® drive lockout A compromised asset can be secured by encrypting and locking the boot sector of the hard drive, preventing access to the operating system. A bypass password option allows return to normal operation if the asset is recovered. Offline Curfew™ Administrators can set a curfew for specific assets. If an asset fails to connect to a network for a specified amount of time. Bitlocker and FileVault Management Deploy BitLocker and FileVault quickly and easily to your entire organisation. Fast, OS-native encryption More and more IT professionals are choosing to deploy the Full Disk Encryption (FDE) capabilities built into their operating systems. Superior user experience Disk encryption can be a disruptive and confusing process for end users. Not with EXO5. A client-side wizard guides users through the FDE process--from announcing your FDE program, to giving users the option to 'snooze' initial encryption until a convenient time, to setting up passwords. Supports compliance To comply with data protection regulations such as HIPAA, PCI DSS, and SOX, organizations must prove that data on compromised assets is encrypted. Networking & Security
Made with FlippingBook
RkJQdWJsaXNoZXIy NDUxNDM=