Aims to put a dent in the impact of $2.6 million in losses due to 12,000 laptops lost in airports every week.
Photo: Software remotely destroys data and report success via e-mail.
New software from GadgetTrak provides the ability to remotely destroy data on stolen laptops. In addition to providing tracking information to recover the device, the software wipes sensitive data on the device complying with the US Department of Defense clearing and sanitizing standard DOD 5220.22-M to ensure that data is thoroughly and irrecoverably destroyed.
A recent study conducted by the Ponemon Institute found that 36% of data breaches were the result of lost and stolen laptops or other mobile devices costing companies $2.6 million dollars per incident. As the workforce becomes more mobile this number is expected to increase. In a separate study the Ponemon Institute found that 12,000 laptops are lost in US airports each week, 70 percent of which are not recovered.
When a laptop with GadgetTrak® Search & DestroyTM installed is stolen, the owner of the device will automatically receive tracking information as the device changes location. The owner can securely enable remote data destruction, once activated. The software then sends an e-mail to the owner once the data wipe is verified. All personal information including documents, e-mails, application settings, cookies, passwords, photos and other information are wiped from the system.
"Every day we hear about laptops being stolen with sensitive information. For our corporate, government and health care customers the cost of a laptop being stolen is not the value of equipment, but the risks associated with data on the device, especially when customer and patient records are involved. Not only can we now track and recover the device revealing the thief's identity and device location, but also ensure that any data on the device is not compromised" stated GadgetTrak founder and chief technology officer Ken Westin.
GadgetTrak Search & Destroy works with Windows 2000, NT, XP, 2003 and Vista. The software is designed to work in hostile network environments, is hidden on the system, tamper-proof and cannot be removed without an administrative password.