Tactical Advice

Laptop LoJack

Don't cry if your mobile users occasionally lose their notebooks or even have them stolen. Instead, use this app to help get them back.
This story appears in the November 2006 issue of BizTech Magazine.

What happens if someone hijacks or steals your computer? Wouldn’t it be nice if information technology could wipe all the data off that machine remotely and then help you recover the stolen notebook using a built-in homing beacon? That’s exactly what ComputraceComplete from Absolute Software does.

End-user advantages: Taking up only 8 kilobytes of memory, this techie LoJack will go unnoticed by your road warriors. But they will sleep better knowing that the sensitive data on a notebook PC left at the airport isn’t falling into the wrong hands.

If the notebook is lost or stolen, you can activate the software over the Internet to wipe clean the data selected for removal. Computrace wipes the disk clean by overwriting the data seven times, bit by bit, using an algorithm that meets the NATO deletion standard and exceeds Defense Department standards. The software also helps with regulatory compliance because it allows IT to store purchase and upgrade dates, notebook hardware specifications, location data and end-user history.

Why Computrace works for IT: Simply install a small hard-to-detect persistent software program that communicates with a central server over the Internet. For a number of newer Hewlett-Packard and Gateway notebooks, the software program can be wedged into the BIOS, making it even harder for the bad guys to detect or tamper with. The client calls the monitoring center once a day — every 15 minutes if the notebook has been reported stolen. The application resides in the partition group and can survive normal attempts to clean up the hard drive.

Compatible with any current file-level encryption products, the product will prevent hackers from getting into sensitive data stores. In addition to the built-in remote tracking, you also can call Absolute and have them track the computer and communicate with local authorities to recover the machine.

The small software program plays ball well with antivirus programs such as McAfee VirusScan, Symantec Norton AntiVirus and Trend Micro PC-cillin, although it’s a good idea to disable that software during the installation, and then re-enable it. Logon scripts are supported.

Disadvantages: You must subscribe to this software, which means a hit to that ever-shrinking IT budget each and every year. The data deletion feature, if activated, requires a one-time hit of about $200, but that’s well worth it if the data is important and confidential. If you have older notebooks and can’t use the BIOS version, the tracking and data deletion features lose some of their luster as thieves can simply wipe the operating system. In the case of corporate espionage, the hard drive can simply be moved to another machine or another operating system installed on the top of the original, and the sensitive data may be accessed.

The tracking and data deletion features also only work when and if the notebook is ever online. If the thief doesn’t connect to the Internet, you can’t delete the data because Computrace initiates the Data Deletion service over the Internet.

Although Computrace is available for Apple computers, it’s not as well supported. Installation of the program must be done manually, either at the keyboard or via a remote administration session.

MSRP: $49.99 for a 12-month subscription; $89.99 for 24 months.

Dr. Jeff Sheen is a senior corporate network engineer for Software Architects of Chicago and works in the company’s Columbus, Ohio, office.


CEO takeaway
Most notebook thefts are inside jobs, but the ComputraceComplete subscription service and software provide an added measure of insurance when:

• You have traveling staff with sensitive data on their notebooks.
• You have problems with lost or stolen notebook computers.
• Your business must track technology assets to comply with Sarbanes-Oxley and Health Insurance Portability and Accountability Act reporting requirements.


Sign up for our e-newsletter


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.