Wednesday, August 27, 2014
Breaking News

Absolute Software/LoJack for Laptops, Tablets and Smartphones: Track and Recover Your Important Data

0
0
0
0
0
0
0
0
0
or copy the link
pf button both Absolute Software/LoJack for Laptops, Tablets and Smartphones: Track and Recover Your Important Data

By David Crane
defrev (at) gmail (dot) com

All photos and video clips contained in this article were shot by DefenseReview.com, and are copyrighted. DefenseReview.com owns the copyright on these photos and video clips. The photos and video clips embedded below were shot with a Canon PowerShot S90 10-megapixel digital camera (still camera with video capability).

The following article is property of DefenseReview.com (DR) and is copyrighted material. If you are reading this article on another website other than DefenseReview.com, please email us the website address/URL (where the unauthorized DR article reprint is located) at defrev (at) gmail (dot) com. Thank you.

December 17, 2012

Absolute Software Computrace Software Firmware LoJack for Laptops Tablets and Smartphones 1 Absolute Software/LoJack for Laptops, Tablets and Smartphones: Track and Recover Your Important Data Now this is a product DefenseReview (DR) can get behind, provided it's only used to help us locate and recover our stuff, and not used against us by Big Brother (Nineteen Eighty Four), "Minority Report"-style (to mix literary/film references) to track our movements and track us down. Why does technology always have to be a double-edged sword? Anyway, the folks at Absolute Software/LoJack were kind enough to explain the technology to us at HALO Counter-Terrorism Summit 2012.

Normally, if your laptop, tablet or smartphones gets swiped, you have about a 3% chance of recovering. But with Absolute's "LoJack for laptops" (and tablets and smarphones), you're recovery chances are signficantly higher, thanks to the combination of its patented software/firmware and "Theft Recovery Team" which tracks it and works with local law enforcement to perform the actual recovery. That's not all. In the meantime, you can remotely lock and delete sensitive data.

Here's how the flow chart goes, specifically:

Computrace Agent is installed. Computer is stolen. Owner contacts local police and Absolute Software. Absolute Theft Recovery Team forensically mines stolen computer for information. Location of stolen computer is identified. Absolute Theft Recovery Team works with local police agencies to recover stolen computer.

The company's website claims that, so far, 27,000+ laptops have been recovered, as a result.

Company Contact Info:

United States Headquarters
430-11401 Century Oaks Terrace
Austin, Texas 78758
Toll Free: 800-220-0733
Direct: 512-600-7455
Email Contacts Page: http://www.absolute.com/company/contact
Website: http://www.absolute.com/lojackforlaptops

Federal Office
1655 North Fort Myer Dr. #700
Arlington, VA 22209
Phone: 703-248-2614
Fax: 703-361-5298
Email Contact Page: http://www.absolute.com/company/contact
Website: http://www.absolute.com/lojackforlaptops

Canadian Headquarters
1600-1055 Dunsmuir Street
Vancouver, British Columbia
V7X 1K8
Toll Free: 800-220-0733
Direct: 1-604-730-9851
Fax: 1-604-730-2621
Email Contacts Page: http://www.absolute.com/company/contact
Website: http://www.absolute.com/lojackforlaptops

EMEA
Aquis House
49-51 Blagrave Street,
Reading, Berkshire
RG1 1PL England
Phone: +44 118 902 2000
Fax: +44 118 902 2010
Email: [email protected]
Registered in England and Wales
Company No. 5802063
Website: http://www.absolute.com/lojackforlaptops

Asia Pacific Unit 20, 2 Premier Suite,
One Mont Kiara, 1 Jalan Kiara,
Mont Kiara, 50480
Kuala Lumpur, Malaysia
Phone: +603 6205 9810
Website: http://www.absolute.com/lojackforlaptops

© Copyright 2012 DefenseReview.com. All rights reserved. This material may not be published, broadcast, rewritten or redistributed without receiving permission and providing proper credit and appropriate links.

Related Articles:

M5 Network Security SCS-100 Secure Communications System for Cybersecurity: “Game-Changing” High-Tech Encrypted Mobile Tactical Communications (Tactical Comms) Module for Net-Centric Warfare Operations and Military Special Operations Forces (SOF) and Intelligence Personnel on Clandestine Missions

Lucid Dimensions Spherical Detection Systems (SDS) 3D Passive Infrared (IR) Spherical Sensor Array Searches, Detects and Tracks High-Speed Ballistic Threats, Aircraft, Vehicles, You Name It.

Absolute Software/LoJack for Laptops, Tablets and Smartphones: Track and Recover Your Important Data by
0
0
0
0
0
0
0
0
0
or copy the link

About David Crane

David Crane started publishing online in 2001. Since that time, governments, military organizations, Special Operators (i.e. professional trigger pullers), agencies, and civilian tactical shooters the world over have come to depend on Defense Review as the authoritative source of news and information on "the latest and greatest" in the field of military defense and tactical technology and hardware, including tactical firearms, ammunition, equipment, gear, and training.