Secure your business data. EXO5 offers real-time laptop, smartphone & tablet tracking with ultra-accurate location & remote data protection
Everything you need to run a more secure laptop fleet.
Track laptops and mobile devices, counteract theft, secure sensitive data, and stay compliant with data privacy standards. All with a single cloud-based console.
FIVE ESSENTIAL FEATURES, ONE POWERFUL PRODUCT
Laptop and Device Tracking
Track and locate laptops, smartphones and tablets across your organisation in real-time.
Real-time agent
The EXO5 agent uses a persistent and secure connection to provide asset inventory, geolocation and command execution in real-time. Information is always up-to-date, which is critical in a developing theft scenario.
Ultra-accurate location
EXO5 uses multiple methods to locate assets to provide the best location accuracy worldwide including wi-fi and cellular triangulation, GPS, MAC address correlation, and IP address databases from multiple providers.
Dynamic maps
Use the Google Maps interface to quickly locate assets, or the real-time LiveMap and Google Earth display for a commanding view of your entire organisation.
RemoteKill®
Prevent asset theft and data breaches with anti-theft countermeasures including hard drive lockout, out-of-band file encryption, and full disk encryption PIN revocation.
RemoteKill® file encryption
Data on a compromised asset can be quickly encrypted, protecting it from unauthorised users. RemoteKill encryption works out-of-band, meaning data can even be protected from previously authorised users such as terminated employees.
RemoteKill® drive lockout
A compromised asset can be secured by encrypting and locking the boot sector of the hard drive, preventing access to the operating system. A bypass password option allows return to normal operation if the asset is recovered.
Offline Curfew™
Administrators can set a curfew for specific assets. If an asset fails to connect to a network for a specified amount of time, it will autonomously execute pre-programmed RemoteKill actions, protecting assets even if they never connect to the internet.
Full Disk Encryption
Deploy and manage Windows Bitlocker and Mac OS X Filevault. Stay compliant with data privacy standards using industry-standard OS-native encryption.
Fast, OS-native encryption
More and more IT professionals are choosing to deploy the FDE capabilities built into their operating systems. Windows Bitlocker and Mac FileVault offer excellent performance and compatibility with the widest range of hardware, plus a great integrated user experience. EXO5 lets you leverage these OS-native advantages for a more successful FDE program
Superior user experience
Disk encryption can be a disruptive and confusing process for end users. Not with EXO5. A client-side wizard guides users through the FDE process--from announcing your FDE program, to giving users the option to 'snooze' initial encryption until a convenient time, to setting up passwords. EXO5 provides users with a better experience and reduces calls to the help desk.
Supports compliance
To comply with data protection regulations such as HIPAA, PCI DSS, and SOX, organisations must prove that data on compromised assets is encrypted. EXO5 provides the audit records and reports you need to establish compliance.
Policy-based management
Mass-deploy FDE using asset groups and policies. Delegate authority over groups of assets with administrator roles. Enforce PIN and password complexity requirements with policy-based settings.
Mobile Device Management
Protect smartphones and tablets and address BYOD with ease.
FREE Android/iOS license
EXO5 supports all popular smartphones and tablets running Android and iOS at no additional cost.
RemoteKill® device lock and wipe
Compromised devices can be locked with a passcode or remotely wiped back to their factory state, preventing sensitive data from getting into the wrong hands.
Asset inventory
Collect hardware and software inventory in real-time and extend your data with custom fields.
Enforce security policy
Administrators can require devices to use a lock screen code, with a system-generated or user-provided PIN.
IT Asset Management
Make better decisions with real-time asset inventory and powerful reporting capabilities.
Hardware/software inventory
Collect essential ITAM data including hardware and software inventory, and network and operating system information. Extend inventory data with custom fields.
Reports and proof-of-compliance
Choose from pre-set report templates or create custom reports. RemoteKill® and disk encryption event logs support adherence to privacy regulation and provide crucial proof of compliance to auditors.
RiskSense™ alerts
RiskSense monitoring identifies usage patterns that may indicate impending asset theft of security lapses, such as non-reporting devices, idle equipment, and unauthorised user changes. Investigate and resolve potential asset compromises before they happen.
Enforce security policy
Feed EXO5 data to your helpdesk, CRM, ERP, and other enterprise applications with EXO5 data APIs. Eliminate double-entry and deliver accurate ITAM data throughout your organisation.
License: |
Everything you need to run a more secure laptop fleet.
Track laptops and mobile devices, counteract theft, secure sensitive data, and stay compliant with data privacy standards. All with a single cloud-based console.
FIVE ESSENTIAL FEATURES, ONE POWERFUL PRODUCT
Laptop and Device Tracking
Track and locate laptops, smartphones and tablets across your organisation in real-time.
Real-time agent
The EXO5 agent uses a persistent and secure connection to provide asset inventory, geolocation and command execution in real-time. Information is always up-to-date, which is critical in a developing theft scenario.
Ultra-accurate location
EXO5 uses multiple methods to locate assets to provide the best location accuracy worldwide including wi-fi and cellular triangulation, GPS, MAC address correlation, and IP address databases from multiple providers.
Dynamic maps
Use the Google Maps interface to quickly locate assets, or the real-time LiveMap and Google Earth display for a commanding view of your entire organisation.
RemoteKill®
Prevent asset theft and data breaches with anti-theft countermeasures including hard drive lockout, out-of-band file encryption, and full disk encryption PIN revocation.
RemoteKill® file encryption
Data on a compromised asset can be quickly encrypted, protecting it from unauthorised users. RemoteKill encryption works out-of-band, meaning data can even be protected from previously authorised users such as terminated employees.
RemoteKill® drive lockout
A compromised asset can be secured by encrypting and locking the boot sector of the hard drive, preventing access to the operating system. A bypass password option allows return to normal operation if the asset is recovered.
Offline Curfew™
Administrators can set a curfew for specific assets. If an asset fails to connect to a network for a specified amount of time, it will autonomously execute pre-programmed RemoteKill actions, protecting assets even if they never connect to the internet.
Full Disk Encryption
Deploy and manage Windows Bitlocker and Mac OS X Filevault. Stay compliant with data privacy standards using industry-standard OS-native encryption.
Fast, OS-native encryption
More and more IT professionals are choosing to deploy the FDE capabilities built into their operating systems. Windows Bitlocker and Mac FileVault offer excellent performance and compatibility with the widest range of hardware, plus a great integrated user experience. EXO5 lets you leverage these OS-native advantages for a more successful FDE program
Superior user experience
Disk encryption can be a disruptive and confusing process for end users. Not with EXO5. A client-side wizard guides users through the FDE process--from announcing your FDE program, to giving users the option to 'snooze' initial encryption until a convenient time, to setting up passwords. EXO5 provides users with a better experience and reduces calls to the help desk.
Supports compliance
To comply with data protection regulations such as HIPAA, PCI DSS, and SOX, organisations must prove that data on compromised assets is encrypted. EXO5 provides the audit records and reports you need to establish compliance.
Policy-based management
Mass-deploy FDE using asset groups and policies. Delegate authority over groups of assets with administrator roles. Enforce PIN and password complexity requirements with policy-based settings.
Mobile Device Management
Protect smartphones and tablets and address BYOD with ease.
FREE Android/iOS license
EXO5 supports all popular smartphones and tablets running Android and iOS at no additional cost.
RemoteKill® device lock and wipe
Compromised devices can be locked with a passcode or remotely wiped back to their factory state, preventing sensitive data from getting into the wrong hands.
Asset inventory
Collect hardware and software inventory in real-time and extend your data with custom fields.
Enforce security policy
Administrators can require devices to use a lock screen code, with a system-generated or user-provided PIN.
IT Asset Management
Make better decisions with real-time asset inventory and powerful reporting capabilities.
Hardware/software inventory
Collect essential ITAM data including hardware and software inventory, and network and operating system information. Extend inventory data with custom fields.
Reports and proof-of-compliance
Choose from pre-set report templates or create custom reports. RemoteKill® and disk encryption event logs support adherence to privacy regulation and provide crucial proof of compliance to auditors.
RiskSense™ alerts
RiskSense monitoring identifies usage patterns that may indicate impending asset theft of security lapses, such as non-reporting devices, idle equipment, and unauthorised user changes. Investigate and resolve potential asset compromises before they happen.
Enforce security policy
Feed EXO5 data to your helpdesk, CRM, ERP, and other enterprise applications with EXO5 data APIs. Eliminate double-entry and deliver accurate ITAM data throughout your organisation.
License: |
- Review: The 10 Best Wireless Access Points
- Review: The Top 10 Best Ethernet Cables
- What Is An Ethernet Cable And What Does It Do?
- 10 Best CCTV Security IP Cameras For Home & Business
- Review: Best Powerline Adapters In The UK
- Celebrating 20 Years Of Comms Express!
- The Top 10 DrayTek Wireless Access Points
- Best Selling APC Products At Comms Express
- Review: Top 5 Best Performing APC Uninterruptible Power Supply Units (UPS)
- Review: Top 10 Best PDU’s