RemoteKill®

Prevent asset and data theft with essential anti-theft countermeasures.

RemoteKill®

RemoteKill® file encryption

Data on a compromised asset can be quickly encrypted, protecting it from unauthorized users. RemoteKill encryption works out-of-band, meaning data can even be protected from previously authorized users such as terminated employees. Screenshot >

RemoteKill® drive lockout

A compromised asset can be secured by encrypting and locking the boot sector of the hard drive, preventing access to the operating system. A bypass password option allows return to normal operation if the asset is recovered. Screenshot >

Offline Curfew™

Administrators can set a curfew for specific assets. If an asset fails to connect to a network for a specified amount of time, it will autonomously execute preprogrammed RemoteKill actions, protecting assets even if they never connect to the internet.

FDE lockout

Administrators can instantly change the full disk encryption PIN/password on a compromised device and prevent any access to the operating system or sensitive data.

Real-time execution

The EXO5 agent uses a persistent and secure connection that allows RemoteKill command execution in real-time. When it comes to security breaches, time is of the essence.

Get Started

Create your Free, 30-day Trial Account now or Contact Sales

Get Started Notebook