November 01, 2003
from $49.95 per year or $99.95 3 years per laptop
- Ease of Use:
- Value for Money:
- Overall Rating:
Enterprise level tracking solution that can be rolled out with ease. Also suitable for single laptop use, easy to install and make initial handshake.
Documentation remains sparse, but adequate.
Excellent tracking possibilities, cannot be removed with reformatting, add-ons available, can also be used as an in-house security tool.
Even the most vigilant among us can still become victims of crime. But if the worst happens and a laptop is stolen, if it is protected and traceable then the stress involved should be much reduced.
With so many good security tools available that can pinpoint a stolen laptop, the decision on which to use has to come down to personal or corporate choice. But it is always worth noting that each product has a slight variation on the theme, with no two solutions being identical. Take zTrace, it will resist a hard drive reformat so that even after a theft it can still be located. This is ideal where many stolen laptops are reformatted as a matter of course, or split for parts.
Installation is pretty simple. As the details needed are entered, using the customer ID, the zTrace server picks up the laptop details as a handshake takes place. Once accomplished, each time you go on-line the location of the computer can be logged. So if it is stolen you can simply report the theft to the law enforcement and zTrace, which will alert the team and enable a report to be generated for its recovery as soon as it has been plugged in.
A number of years ago when first developed, these tracking solutions, because they relied on internet access, were less effective. But, because nearly all laptops are used for on-line activity, their success rate has soared. This makes a tracking software solution a real commodity in the worst case scenario.
This software is also ideal for enterprise use as it is easily rolled out across all corporate laptops using an image file. Once the image has been installed on the machines and they are next booted up, the setup runs automatically, making it ideal for workstations too.
ZTrace Gold can also be installed using server push out tools. Operating in stealth mode there are no desktop icons, files or folders to give the game away and not even a call made from an unlisted number will be enough to shake the zTrace team off guard.
There are also add-on applications to protect data and erase it if necessary. For enterprise use, it is also possible to track assets and to ensure all location information is kept in-house, making it very flexible for large corporate or Government use.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry