The CyberAngel Tracking Software
CyberAngel Security Solutions Inc
$59.95 1 year license
The CyberAngel has seven years behind it and is a tried and tested tracking software option that also provides data security.
Hard to fault.
Great tracking, alerting and encryption of data suitable for any laptop, offering good security and peace of mind.
With seven years behind it, Cyber Angel software has developed into a neat little package, which, apart from its tracking capabilities, also offers a CyberAngel Secured Drive. This requires password authentication but, once in, allows the user to keep all confidential data in total privacy in this protected drive. With on-the-fly encryption, the user does not need to worry about any data being revealed if the laptop falls into the wrong hands, using a choice of encryption algorithms to protect it such as Rijndael - AES 128 or 256 bit encryption, Blowfish 128 or 448 bit, Twofish 128 or 256 bit, Triple DES or DES. The virtual drive created by CyberAngel is accessed with the users password and is supported by 32-bit device drivers for fast access with little or no drop in performance.
The beauty of this product is that, when a theft occurs and the user is unable to provide the authorized password, the virtual drive takes on an invisible mantel and if a thief can't see it then they won't know it's there. This enables the user to keep all critical data protected. However, if the password is correctly entered, the user has unlimited access - not so when an attempt to make an unauthorized entry is made. Although an extremely efficient and well tried and tested software tracking device, CyberAngel also offers an alert by either fax or email that will tell you if anyone unauthorized has tried to access it. From any location, the CyberAngel Recovery Center can pinpoint the whereabouts of the stolen computer.
CyberAngel is compatible with most Windows operating systems so it is ideal for laptop use. Simple to install and with a pretty small footprint, CyberAngel can dial-up from anywhere when it is connected to a phone line or network connection, ensuring that ,if after it has been stolen someone attempts to use the internet, the software, in stealth mode, will connect and distribute its whereabouts to the recovery center.
Hiding confidential data from unauthorized access, the alert and tracking all make for a great way to secure company information and personal records, which if accessed by an unscrupulous individual could lead to identity theft, fraud, a successful network hack and further financial losses for the corporate owner. Even the recycle bin is protected!