Encrypt and lock out compromised assets
View assets on real-time maps
Display live streaming asset data
Following a theft or loss event, RemoteKill can remotely encrypt sensitive data files. RemoteKill™ encryption is effective even if the unauthorized user has access to a login account on the machine, providing an additional layer of protection beyond full disk encryption.
RemoteKill™ renders stolen PCs useless using a multilayered approach, including MBR lockout and encryption.
Administrators can set a curfew for specific assets. If an asset fails to connect to the LAN or Internet for a specified amount of time, it will autonomously execute preprogrammed RemoteKill actions, protecting assets even if they remain offline.
RemoteKill™ operations are reversible, allowing IT to be aggressive about device security. If a missing device is recovered or found, it can quickly be restore to normal operation.