Call us FREE on 0800 488 000
X
X

Please Log In Below

Forgotten Password?
Retry
Login
loading Gif
Sorry! You can't edit your cart on this page.
Sorry! This item could not be added to your cart as it is no longer available from Comms Express.
Please check the quantity you are adding and try again.
The following item has been added to your cart.
Product Code:
Options:
Qty:
Unit Price:£
View Cart
Checkout
Your cart is empty.
Subtotal:
£0
Remove all items from cart
Are you sure? Yes No
Learn more about how
to collect Data Points
for free gifts.
Comms Express Finance Options
Request A Quote
View Cart
Checkout
Cookie Policy×

Hi there! Our website may store cookies on your computer in order to give you the best experience, such as remembering the items in your cart so you can continue shopping where you left off.

By continuing to use our site, you give consent for cookies to be used.

Browse Categories
Spend £100.00 for
FREE DELIVERY.
Free delivery excludes heavy and bulky products
More Info
Everything you need to run a more secure laptop fleet.
EXO5 Starter Package
EXO5 Logo

Everything you need to run a more secure laptop fleet. Track laptops and mobile devices, counteract theft, secure sensitive data, and stay compliant with data privacy standards. All with a single cloud-based console.

FIVE ESSENTIAL FEATURES, ONE POWERFUL PRODUCT

Laptop and Device Tracking Track and locate laptops, smartphones and tablets across your organisation in real-time.

Real-time agent The EXO5 agent uses a persistent and secure connection to provide asset inventory, geolocation and command execution in real-time. Information is always up-to-date, which is critical in a developing theft scenario.


Ultra-accurate location EXO5 uses multiple methods to locate assets to provide the best location accuracy worldwide including wi-fi and cellular triangulation, GPS, MAC address correlation, and IP address databases from multiple providers.


Dynamic maps Use the Google Maps interface to quickly locate assets, or the real-time LiveMap and Google Earth display for a commanding view of your entire organisation.




RemoteKill® Prevent asset theft and data breaches with anti-theft countermeasures including hard drive lockout, out-of-band file encryption, and full disk encryption PIN revocation.

RemoteKill® file encryption Data on a compromised asset can be quickly encrypted, protecting it from unauthorised users. RemoteKill encryption works out-of-band, meaning data can even be protected from previously authorised users such as terminated employees.


RemoteKill® drive lockout A compromised asset can be secured by encrypting and locking the boot sector of the hard drive, preventing access to the operating system. A bypass password option allows return to normal operation if the asset is recovered.


Offline Curfew™ Administrators can set a curfew for specific assets. If an asset fails to connect to a network for a specified amount of time, it will autonomously execute pre-programmed RemoteKill actions, protecting assets even if they never connect to the internet.




Full Disk Encryption Deploy and manage Windows Bitlocker and Mac OS X Filevault. Stay compliant with data privacy standards using industry-standard OS-native encryption.

Fast, OS-native encryption More and more IT professionals are choosing to deploy the FDE capabilities built into their operating systems. Windows Bitlocker and Mac FileVault offer excellent performance and compatibility with the widest range of hardware, plus a great integrated user experience. EXO5 lets you leverage these OS-native advantages for a more successful FDE program


Superior user experience Disk encryption can be a disruptive and confusing process for end users. Not with EXO5. A client-side wizard guides users through the FDE process--from announcing your FDE program, to giving users the option to 'snooze' initial encryption until a convenient time, to setting up passwords. EXO5 provides users with a better experience and reduces calls to the help desk.


Supports compliance To comply with data protection regulations such as HIPAA, PCI DSS, and SOX, organisations must prove that data on compromised assets is encrypted. EXO5 provides the audit records and reports you need to establish compliance.


Policy-based management Mass-deploy FDE using asset groups and policies. Delegate authority over groups of assets with administrator roles. Enforce PIN and password complexity requirements with policy-based settings.




Mobile Device Management Protect smartphones and tablets and address BYOD with ease.

FREE Android/iOS license EXO5 supports all popular smartphones and tablets running Android and iOS at no additional cost.


RemoteKill® device lock and wipe Compromised devices can be locked with a passcode or remotely wiped back to their factory state, preventing sensitive data from getting into the wrong hands.


Asset inventory Collect hardware and software inventory in real-time and extend your data with custom fields.


Enforce security policy Administrators can require devices to use a lock screen code, with a system-generated or user-provided PIN.




IT Asset Management Make better decisions with real-time asset inventory and powerful reporting capabilities.

Hardware/software inventory Collect essential ITAM data including hardware and software inventory, and network and operating system information. Extend inventory data with custom fields.


Reports and proof-of-compliance Choose from pre-set report templates or create custom reports. RemoteKill® and disk encryption event logs support adherence to privacy regulation and provide crucial proof of compliance to auditors.


RiskSense™ alerts RiskSense monitoring identifies usage patterns that may indicate impending asset theft of security lapses, such as non-reporting devices, idle equipment, and unauthorised user changes. Investigate and resolve potential asset compromises before they happen.


Enforce security policy Feed EXO5 data to your helpdesk, CRM, ERP, and other enterprise applications with EXO5 data APIs. Eliminate double-entry and deliver accurate ITAM data throughout your organisation.


 

Express View Logo
License:
In Stock: Next Day
£241.47
£289.76 Inc Vat
Add To Cart
EXO5 Additional Licenses
EXO5 Logo

Everything you need to run a more secure laptop fleet. Track laptops and mobile devices, counteract theft, secure sensitive data, and stay compliant with data privacy standards. All with a single cloud-based console.

FIVE ESSENTIAL FEATURES, ONE POWERFUL PRODUCT

Laptop and Device Tracking Track and locate laptops, smartphones and tablets across your organisation in real-time.

Real-time agent The EXO5 agent uses a persistent and secure connection to provide asset inventory, geolocation and command execution in real-time. Information is always up-to-date, which is critical in a developing theft scenario.


Ultra-accurate location EXO5 uses multiple methods to locate assets to provide the best location accuracy worldwide including wi-fi and cellular triangulation, GPS, MAC address correlation, and IP address databases from multiple providers.


Dynamic maps Use the Google Maps interface to quickly locate assets, or the real-time LiveMap and Google Earth display for a commanding view of your entire organisation.




RemoteKill® Prevent asset theft and data breaches with anti-theft countermeasures including hard drive lockout, out-of-band file encryption, and full disk encryption PIN revocation.

RemoteKill® file encryption Data on a compromised asset can be quickly encrypted, protecting it from unauthorised users. RemoteKill encryption works out-of-band, meaning data can even be protected from previously authorised users such as terminated employees.


RemoteKill® drive lockout A compromised asset can be secured by encrypting and locking the boot sector of the hard drive, preventing access to the operating system. A bypass password option allows return to normal operation if the asset is recovered.


Offline Curfew™ Administrators can set a curfew for specific assets. If an asset fails to connect to a network for a specified amount of time, it will autonomously execute pre-programmed RemoteKill actions, protecting assets even if they never connect to the internet.




Full Disk Encryption Deploy and manage Windows Bitlocker and Mac OS X Filevault. Stay compliant with data privacy standards using industry-standard OS-native encryption.

Fast, OS-native encryption More and more IT professionals are choosing to deploy the FDE capabilities built into their operating systems. Windows Bitlocker and Mac FileVault offer excellent performance and compatibility with the widest range of hardware, plus a great integrated user experience. EXO5 lets you leverage these OS-native advantages for a more successful FDE program


Superior user experience Disk encryption can be a disruptive and confusing process for end users. Not with EXO5. A client-side wizard guides users through the FDE process--from announcing your FDE program, to giving users the option to 'snooze' initial encryption until a convenient time, to setting up passwords. EXO5 provides users with a better experience and reduces calls to the help desk.


Supports compliance To comply with data protection regulations such as HIPAA, PCI DSS, and SOX, organisations must prove that data on compromised assets is encrypted. EXO5 provides the audit records and reports you need to establish compliance.


Policy-based management Mass-deploy FDE using asset groups and policies. Delegate authority over groups of assets with administrator roles. Enforce PIN and password complexity requirements with policy-based settings.




Mobile Device Management Protect smartphones and tablets and address BYOD with ease.

FREE Android/iOS license EXO5 supports all popular smartphones and tablets running Android and iOS at no additional cost.


RemoteKill® device lock and wipe Compromised devices can be locked with a passcode or remotely wiped back to their factory state, preventing sensitive data from getting into the wrong hands.


Asset inventory Collect hardware and software inventory in real-time and extend your data with custom fields.


Enforce security policy Administrators can require devices to use a lock screen code, with a system-generated or user-provided PIN.




IT Asset Management Make better decisions with real-time asset inventory and powerful reporting capabilities.

Hardware/software inventory Collect essential ITAM data including hardware and software inventory, and network and operating system information. Extend inventory data with custom fields.


Reports and proof-of-compliance Choose from pre-set report templates or create custom reports. RemoteKill® and disk encryption event logs support adherence to privacy regulation and provide crucial proof of compliance to auditors.


RiskSense™ alerts RiskSense monitoring identifies usage patterns that may indicate impending asset theft of security lapses, such as non-reporting devices, idle equipment, and unauthorised user changes. Investigate and resolve potential asset compromises before they happen.


Enforce security policy Feed EXO5 data to your helpdesk, CRM, ERP, and other enterprise applications with EXO5 data APIs. Eliminate double-entry and deliver accurate ITAM data throughout your organisation.


 

Express View Logo
License:
In Stock: Next Day
£16.76
£20.11 Inc Vat
Add To Cart
Other Ranges Available
Cisco Security
Cisco Security
View Range
WatchGuard Network Security Appliances
WatchGuard
View Range
SonicWall
SonicWall
View Range
Juniper Networks Routers and Security Gateways
View Range
F-Secure Cyber Security and Online Privacy Licenses
F-Secure Cyber Security and Online Privacy Licenses
View Range
Join Our Mailing List
Social Links
  • Apply for Credit