Call us FREE on 0800 488 000
X
X

Please Log In Below

Forgotten Password?
Retry
Login
loading Gif
Sorry! You can't edit your cart on this page.
Sorry! This item could not be added to your cart as it is no longer available from Comms Express.
Please check the quantity you are adding and try again.
The following item has been added to your cart.
Product Code:
Options:
Qty:
Unit Price:£
View Cart
Checkout
Your cart is empty.
Subtotal:
£0
Remove all items from cart
Are you sure? Yes No
Learn more about how
to collect Data Points
for free gifts.
Comms Express Finance Options
Request A Quote
View Cart
Checkout
Cookie Policy×

Hi there! Our website may store cookies on your computer in order to give you the best experience, such as remembering the items in your cart so you can continue shopping where you left off.

By continuing to use our site, you give consent for cookies to be used.

Spend £100.00 for
FREE DELIVERY.
Free delivery excludes heavy and bulky products
Browse Categories
In Stock: Next Day
£16.76
£20.11 Inc VAT
Earn 8 Data Points when purchasing this product. More Info

/assets/images/gallery/large/1585007132EXO2.png

EXO5 Additional Licenses

EXO5 Additional Licenses

by EXO5
See more product details
License:
Part No:EXO-1100-1B
Manufacturer No:1100-1B
Delivery: In Stock: Next Day

/assets/images/gallery/large/1585007132EXO2.png

EXO5 Additional Licenses
Similar & Related Items (See All)
Qty:
Click to change options
License:
Apply
£241.47 Ex VAT
More Related Items
Click to change options
Colour:
Door:
Flat Pack:
Accessory Kit:
Apply
£554.16 Ex VAT
Qty:
Email product to a friend
X
  • Scroll to top
    EXO5 Additional Licenses

    Everything you need to run a more secure laptop fleet.

    Track laptops and mobile devices, counteract theft, secure sensitive data, and stay compliant with data privacy standards. All with a single cloud-based console.

    FIVE ESSENTIAL FEATURES, ONE POWERFUL PRODUCT

    Laptop and Device Tracking

    Laptop and Device Tracking

    Track and locate laptops, smartphones and tablets across your organisation in real-time.

    • Real-time agent

      The EXO5 agent uses a persistent and secure connection to provide asset inventory, geolocation and command execution in real-time. Information is always up-to-date, which is critical in a developing theft scenario.

    • Ultra-accurate location

      EXO5 uses multiple methods to locate assets to provide the best location accuracy worldwide including wi-fi and cellular triangulation, GPS, MAC address correlation, and IP address databases from multiple providers.

    • Dynamic maps

      Use the Google Maps interface to quickly locate assets, or the real-time LiveMap and Google Earth display for a commanding view of your entire organisation.

    RemoteKill

    RemoteKill®

    Prevent asset theft and data breaches with anti-theft countermeasures including hard drive lockout, out-of-band file encryption, and full disk encryption PIN revocation.

    • RemoteKill® file encryption

      Data on a compromised asset can be quickly encrypted, protecting it from unauthorised users. RemoteKill encryption works out-of-band, meaning data can even be protected from previously authorised users such as terminated employees.

    • RemoteKill® drive lockout

      A compromised asset can be secured by encrypting and locking the boot sector of the hard drive, preventing access to the operating system. A bypass password option allows return to normal operation if the asset is recovered.

    • Offline Curfew™

      Administrators can set a curfew for specific assets. If an asset fails to connect to a network for a specified amount of time, it will autonomously execute pre-programmed RemoteKill actions, protecting assets even if they never connect to the internet.

    Full Disk Encryption

    Full Disk Encryption

    Deploy and manage Windows Bitlocker and Mac OS X Filevault. Stay compliant with data privacy standards using industry-standard OS-native encryption.

    • Fast, OS-native encryption

      More and more IT professionals are choosing to deploy the FDE capabilities built into their operating systems. Windows Bitlocker and Mac FileVault offer excellent performance and compatibility with the widest range of hardware, plus a great integrated user experience. EXO5 lets you leverage these OS-native advantages for a more successful FDE program

    • Superior user experience

      Disk encryption can be a disruptive and confusing process for end users. Not with EXO5. A client-side wizard guides users through the FDE process--from announcing your FDE program, to giving users the option to 'snooze' initial encryption until a convenient time, to setting up passwords. EXO5 provides users with a better experience and reduces calls to the help desk.

    • Supports compliance

      To comply with data protection regulations such as HIPAA, PCI DSS, and SOX, organisations must prove that data on compromised assets is encrypted. EXO5 provides the audit records and reports you need to establish compliance.

    • Policy-based management

      Mass-deploy FDE using asset groups and policies. Delegate authority over groups of assets with administrator roles. Enforce PIN and password complexity requirements with policy-based settings.

    Laptop and Device Tracking

    Mobile Device Management

    Protect smartphones and tablets and address BYOD with ease.

    • FREE Android/iOS license

      EXO5 supports all popular smartphones and tablets running Android and iOS at no additional cost.

    • RemoteKill® device lock and wipe

      Compromised devices can be locked with a passcode or remotely wiped back to their factory state, preventing sensitive data from getting into the wrong hands.

    • Asset inventory

      Collect hardware and software inventory in real-time and extend your data with custom fields.

    • Enforce security policy

      Administrators can require devices to use a lock screen code, with a system-generated or user-provided PIN.

    Laptop and Device Tracking

    IT Asset Management

    Make better decisions with real-time asset inventory and powerful reporting capabilities.

    • Hardware/software inventory

      Collect essential ITAM data including hardware and software inventory, and network and operating system information. Extend inventory data with custom fields.

    • Reports and proof-of-compliance

      Choose from pre-set report templates or create custom reports. RemoteKill® and disk encryption event logs support adherence to privacy regulation and provide crucial proof of compliance to auditors.

    • RiskSense™ alerts

      RiskSense monitoring identifies usage patterns that may indicate impending asset theft of security lapses, such as non-reporting devices, idle equipment, and unauthorised user changes. Investigate and resolve potential asset compromises before they happen.

    • Enforce security policy

      Feed EXO5 data to your helpdesk, CRM, ERP, and other enterprise applications with EXO5 data APIs. Eliminate double-entry and deliver accurate ITAM data throughout your organisation.

     

    Everything you need to run a more secure laptop fleet.

    Track laptops and mobile devices, counteract theft, secure sensitive data, and stay compliant with data privacy standards. All with a single cloud-based console.

    FIVE ESSENTIAL FEATURES, ONE POWERFUL PRODUCT

    Laptop and Device Tracking

    Laptop and Device Tracking

    Track and locate laptops, smartphones and tablets across your organisation in real-time.

    • Real-time agent

      The EXO5 agent uses a persistent and secure connection to provide asset inventory, geolocation and command execution in real-time. Information is always up-to-date, which is critical in a developing theft scenario.

    • Ultra-accurate location

      EXO5 uses multiple methods to locate assets to provide the best location accuracy worldwide including wi-fi and cellular triangulation, GPS, MAC address correlation, and IP address databases from multiple providers.

    • Dynamic maps

      Use the Google Maps interface to quickly locate assets, or the real-time LiveMap and Google Earth display for a commanding view of your entire organisation.

    RemoteKill

    RemoteKill®

    Prevent asset theft and data breaches with anti-theft countermeasures including hard drive lockout, out-of-band file encryption, and full disk encryption PIN revocation.

    • RemoteKill® file encryption

      Data on a compromised asset can be quickly encrypted, protecting it from unauthorised users. RemoteKill encryption works out-of-band, meaning data can even be protected from previously authorised users such as terminated employees.

    • RemoteKill® drive lockout

      A compromised asset can be secured by encrypting and locking the boot sector of the hard drive, preventing access to the operating system. A bypass password option allows return to normal operation if the asset is recovered.

    • Offline Curfew™

      Administrators can set a curfew for specific assets. If an asset fails to connect to a network for a specified amount of time, it will autonomously execute pre-programmed RemoteKill actions, protecting assets even if they never connect to the internet.

    Full Disk Encryption

    Full Disk Encryption

    Deploy and manage Windows Bitlocker and Mac OS X Filevault. Stay compliant with data privacy standards using industry-standard OS-native encryption.

    • Fast, OS-native encryption

      More and more IT professionals are choosing to deploy the FDE capabilities built into their operating systems. Windows Bitlocker and Mac FileVault offer excellent performance and compatibility with the widest range of hardware, plus a great integrated user experience. EXO5 lets you leverage these OS-native advantages for a more successful FDE program

    • Superior user experience

      Disk encryption can be a disruptive and confusing process for end users. Not with EXO5. A client-side wizard guides users through the FDE process--from announcing your FDE program, to giving users the option to 'snooze' initial encryption until a convenient time, to setting up passwords. EXO5 provides users with a better experience and reduces calls to the help desk.

    • Supports compliance

      To comply with data protection regulations such as HIPAA, PCI DSS, and SOX, organisations must prove that data on compromised assets is encrypted. EXO5 provides the audit records and reports you need to establish compliance.

    • Policy-based management

      Mass-deploy FDE using asset groups and policies. Delegate authority over groups of assets with administrator roles. Enforce PIN and password complexity requirements with policy-based settings.

    Laptop and Device Tracking

    Mobile Device Management

    Protect smartphones and tablets and address BYOD with ease.

    • FREE Android/iOS license

      EXO5 supports all popular smartphones and tablets running Android and iOS at no additional cost.

    • RemoteKill® device lock and wipe

      Compromised devices can be locked with a passcode or remotely wiped back to their factory state, preventing sensitive data from getting into the wrong hands.

    • Asset inventory

      Collect hardware and software inventory in real-time and extend your data with custom fields.

    • Enforce security policy

      Administrators can require devices to use a lock screen code, with a system-generated or user-provided PIN.

    Laptop and Device Tracking

    IT Asset Management

    Make better decisions with real-time asset inventory and powerful reporting capabilities.

    • Hardware/software inventory

      Collect essential ITAM data including hardware and software inventory, and network and operating system information. Extend inventory data with custom fields.

    • Reports and proof-of-compliance

      Choose from pre-set report templates or create custom reports. RemoteKill® and disk encryption event logs support adherence to privacy regulation and provide crucial proof of compliance to auditors.

    • RiskSense™ alerts

      RiskSense monitoring identifies usage patterns that may indicate impending asset theft of security lapses, such as non-reporting devices, idle equipment, and unauthorised user changes. Investigate and resolve potential asset compromises before they happen.

    • Enforce security policy

      Feed EXO5 data to your helpdesk, CRM, ERP, and other enterprise applications with EXO5 data APIs. Eliminate double-entry and deliver accurate ITAM data throughout your organisation.

     

    Email product to a friend
    Print product details
    View Keywording: