Enterprise level tracking solution that can be rolled out with ease. Also suitable for single laptop use, easy to install and make initial handshake.
Documentation remains sparse, but adequate.
Excellent tracking possibilities, cannot be removed with reformatting, add-ons available, can also be used as an in-house security tool.
Even the most vigilant among us can still become victims of crime. But if the worst happens and a laptop is stolen, if it is protected and traceable then the stress involved should be much reduced.
With so many good security tools available that can pinpoint a stolen laptop, the decision on which to use has to come down to personal or corporate choice. But it is always worth noting that each product has a slight variation on the theme, with no two solutions being identical. Take zTrace, it will resist a hard drive reformat so that even after a theft it can still be located. This is ideal where many stolen laptops are reformatted as a matter of course, or split for parts.
Installation is pretty simple. As the details needed are entered, using the customer ID, the zTrace server picks up the laptop details as a handshake takes place. Once accomplished, each time you go on-line the location of the computer can be logged. So if it is stolen you can simply report the theft to the law enforcement and zTrace, which will alert the team and enable a report to be generated for its recovery as soon as it has been plugged in.
A number of years ago when first developed, these tracking solutions, because they relied on internet access, were less effective. But, because nearly all laptops are used for on-line activity, their success rate has soared. This makes a tracking software solution a real commodity in the worst case scenario.
This software is also ideal for enterprise use as it is easily rolled out across all corporate laptops using an image file. Once the image has been installed on the machines and they are next booted up, the setup runs automatically, making it ideal for workstations too.
ZTrace Gold can also be installed using server push out tools. Operating in stealth mode there are no desktop icons, files or folders to give the game away and not even a call made from an unlisted number will be enough to shake the zTrace team off guard.
There are also add-on applications to protect data and erase it if necessary. For enterprise use, it is also possible to track assets and to ensure all location information is kept in-house, making it very flexible for large corporate or Government use.