laptop recovery - amazon s3€¦ · laptop recovery data loss prevention all four modules are...

1
Geo-locate laptops in real time no matter where an employee or thief goes (plotted on a map) Geo-location is determined by wi-fi signal, not IP address ,which is highly inaccurate Remotely delete files from the stolen laptop (to a US Dept. of Defense standard that ensures complete destruction of the files) Get confirmation of deletion of files Remotely retrieve files from the stolen laptop Monitor and control everything the thief does Lock down the stolen laptop if desired Our recovery team works with law enforcement to recover the physical asset InterGuard’s Geo-location is more accurate than GPS Just type in www.sonarcentral.com and use this info to log in: Laptop theft/loss remains far and away the biggest cause of confi- dential data loss. In the event of laptop theft or loss, InterGuard’s patented technology allows you to geo-locate stolen laptops in real- time . You can also remotely delete/retrieve files from the stolen com- puter and also monitor and control the thief’s every action. We’ll also work with law enforcement to help you recover the physical property. If you want to take a look and instantly see what the software looks like without having to install anything, just log into the Test Drive below and you'll be able to see a fully working version of the software. Laptop Recovery Features Laptop Recovery InterGuard - LAPTOP RECOVERY 1 2 3 4 InterGuard is a complete insider threat prevention platform that is deployed at the endpoint and delivered in SaaS format. The agent includes 4 modules Web Filtering Employee Monitoring & Productivity Laptop Recovery Data Loss Prevention All four modules are available either separately or together through one agent download and viewable through one client console. Supports different settings for each user Additional Information: No hardware required Can be used in a Terminal Server or Citrix environment Ties in with Active Directory Quick and easy silent deployment with no user prompts if desired Username: test Password: drive www.awarenesstechnologies.com For more information, contact Ingram Micro Services at (800) 705-7057, option 2 or email [email protected].

Upload: others

Post on 13-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Laptop Recovery - Amazon S3€¦ · Laptop Recovery Data Loss Prevention All four modules are available either separately or together through one agent download and viewable through

Geo-locate laptops in real time no matter where an employee or thief goes (plotted on a map)

Geo-location is determined by wi-� signal, not IP address ,which is highly inaccurate

Remotely delete �les from the stolen laptop(to a US Dept. of Defense standard that ensures complete destruction of the �les)

Get con�rmation of deletion of �les

Remotely retrieve �les from the stolen laptop

Monitor and control everything the thief does

Lock down the stolen laptop if desired

Our recovery team works with law enforcement to recover the physical asset

InterGuard’s Geo-location is more accurate than GPS

Just type in www.sonarcentral.com and use this info to log in:

Laptop theft/loss remains far and away the biggest cause of con�-dential data loss. In the event of laptop theft or loss, InterGuard’s patented technology allows you to geo-locate stolen laptops in real-time . You can also remotely delete/retrieve �les from the stolen com-puter and also monitor and control the thief’s every action. We’ll also work with law enforcement to help you recover the physical property.

If you want to take a look and instantly see what the software looks like without having to install anything, just log into the Test Drive below and you'll be able to see a fully working version of the software.

Laptop Recovery Features

Laptop Recovery

InterGuard - LAPTOP RECOVERY

1

2

3

4

InterGuard is a complete insider threatprevention platform that is deployed at the endpoint and delivered in SaaS format.

The agent includes 4 modules

Web Filtering

Employee Monitoring & Productivity

Laptop Recovery

Data Loss Prevention

All four modules are available either separatelyor together through one agent download andviewable through one client console.

Supports di�erent settings for each user

Additional Information:

No hardware required

Can be used in a Terminal Server or Citrix environment

Ties in with Active Directory

Quick and easy silent deployment with no user prompts if desiredUsername: test

Password: drive

4640 Admiralty Way Suite 1010 Los Angeles CA 90292

www.awarenesstechnologies.com

PHONE: 888.224.1288

For more information, contact Ingram Micro Services at (800) 705-7057,option 2 or email [email protected].