The CyberAngel Tracking Software
November 01, 2003
CyberAngel Security Solutions IncProduct:
$59.95 1 year license
- Ease of Use:
- Value for Money:
- Overall Rating:
The CyberAngel has seven years behind it and is a tried and tested tracking software option that also provides data security.
Hard to fault.
Great tracking, alerting and encryption of data suitable for any laptop, offering good security and peace of mind.
With seven years behind it, Cyber Angel software has developed into a neat little package, which, apart from its tracking capabilities, also offers a CyberAngel Secured Drive. This requires password authentication but, once in, allows the user to keep all confidential data in total privacy in this protected drive. With on-the-fly encryption, the user does not need to worry about any data being revealed if the laptop falls into the wrong hands, using a choice of encryption algorithms to protect it such as Rijndael - AES 128 or 256 bit encryption, Blowfish 128 or 448 bit, Twofish 128 or 256 bit, Triple DES or DES. The virtual drive created by CyberAngel is accessed with the users password and is supported by 32-bit device drivers for fast access with little or no drop in performance.
The beauty of this product is that, when a theft occurs and the user is unable to provide the authorized password, the virtual drive takes on an invisible mantel and if a thief can't see it then they won't know it's there. This enables the user to keep all critical data protected. However, if the password is correctly entered, the user has unlimited access - not so when an attempt to make an unauthorized entry is made. Although an extremely efficient and well tried and tested software tracking device, CyberAngel also offers an alert by either fax or email that will tell you if anyone unauthorized has tried to access it. From any location, the CyberAngel Recovery Center can pinpoint the whereabouts of the stolen computer.
CyberAngel is compatible with most Windows operating systems so it is ideal for laptop use. Simple to install and with a pretty small footprint, CyberAngel can dial-up from anywhere when it is connected to a phone line or network connection, ensuring that ,if after it has been stolen someone attempts to use the internet, the software, in stealth mode, will connect and distribute its whereabouts to the recovery center.
Hiding confidential data from unauthorized access, the alert and tracking all make for a great way to secure company information and personal records, which if accessed by an unscrupulous individual could lead to identity theft, fraud, a successful network hack and further financial losses for the corporate owner. Even the recycle bin is protected!
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry