Product Code: | |
Options: | |
Qty: | |
Unit Price: | £ |
Track laptops and mobile devices, counteract theft, secure sensitive data, and stay compliant with data privacy standards. All with a single cloud-based console.
Track and locate laptops, smartphones and tablets across your organisation in real-time.
The EXO5 agent uses a persistent and secure connection to provide asset inventory, geolocation and command execution in real-time. Information is always up-to-date, which is critical in a developing theft scenario.
EXO5 uses multiple methods to locate assets to provide the best location accuracy worldwide including wi-fi and cellular triangulation, GPS, MAC address correlation, and IP address databases from multiple providers.
Use the Google Maps interface to quickly locate assets, or the real-time LiveMap and Google Earth display for a commanding view of your entire organisation.
Prevent asset theft and data breaches with anti-theft countermeasures including hard drive lockout, out-of-band file encryption, and full disk encryption PIN revocation.
Data on a compromised asset can be quickly encrypted, protecting it from unauthorised users. RemoteKill encryption works out-of-band, meaning data can even be protected from previously authorised users such as terminated employees.
A compromised asset can be secured by encrypting and locking the boot sector of the hard drive, preventing access to the operating system. A bypass password option allows return to normal operation if the asset is recovered.
Administrators can set a curfew for specific assets. If an asset fails to connect to a network for a specified amount of time, it will autonomously execute pre-programmed RemoteKill actions, protecting assets even if they never connect to the internet.
Deploy and manage Windows Bitlocker and Mac OS X Filevault. Stay compliant with data privacy standards using industry-standard OS-native encryption.
More and more IT professionals are choosing to deploy the FDE capabilities built into their operating systems. Windows Bitlocker and Mac FileVault offer excellent performance and compatibility with the widest range of hardware, plus a great integrated user experience. EXO5 lets you leverage these OS-native advantages for a more successful FDE program
Disk encryption can be a disruptive and confusing process for end users. Not with EXO5. A client-side wizard guides users through the FDE process--from announcing your FDE program, to giving users the option to 'snooze' initial encryption until a convenient time, to setting up passwords. EXO5 provides users with a better experience and reduces calls to the help desk.
To comply with data protection regulations such as HIPAA, PCI DSS, and SOX, organisations must prove that data on compromised assets is encrypted. EXO5 provides the audit records and reports you need to establish compliance.
Mass-deploy FDE using asset groups and policies. Delegate authority over groups of assets with administrator roles. Enforce PIN and password complexity requirements with policy-based settings.
Protect smartphones and tablets and address BYOD with ease.
EXO5 supports all popular smartphones and tablets running Android and iOS at no additional cost.
Compromised devices can be locked with a passcode or remotely wiped back to their factory state, preventing sensitive data from getting into the wrong hands.
Collect hardware and software inventory in real-time and extend your data with custom fields.
Administrators can require devices to use a lock screen code, with a system-generated or user-provided PIN.
Make better decisions with real-time asset inventory and powerful reporting capabilities.
Collect essential ITAM data including hardware and software inventory, and network and operating system information. Extend inventory data with custom fields.
Choose from pre-set report templates or create custom reports. RemoteKill® and disk encryption event logs support adherence to privacy regulation and provide crucial proof of compliance to auditors.
RiskSense monitoring identifies usage patterns that may indicate impending asset theft of security lapses, such as non-reporting devices, idle equipment, and unauthorised user changes. Investigate and resolve potential asset compromises before they happen.
Feed EXO5 data to your helpdesk, CRM, ERP, and other enterprise applications with EXO5 data APIs. Eliminate double-entry and deliver accurate ITAM data throughout your organisation.
Track laptops and mobile devices, counteract theft, secure sensitive data, and stay compliant with data privacy standards. All with a single cloud-based console.
Track and locate laptops, smartphones and tablets across your organisation in real-time.
The EXO5 agent uses a persistent and secure connection to provide asset inventory, geolocation and command execution in real-time. Information is always up-to-date, which is critical in a developing theft scenario.
EXO5 uses multiple methods to locate assets to provide the best location accuracy worldwide including wi-fi and cellular triangulation, GPS, MAC address correlation, and IP address databases from multiple providers.
Use the Google Maps interface to quickly locate assets, or the real-time LiveMap and Google Earth display for a commanding view of your entire organisation.
Prevent asset theft and data breaches with anti-theft countermeasures including hard drive lockout, out-of-band file encryption, and full disk encryption PIN revocation.
Data on a compromised asset can be quickly encrypted, protecting it from unauthorised users. RemoteKill encryption works out-of-band, meaning data can even be protected from previously authorised users such as terminated employees.
A compromised asset can be secured by encrypting and locking the boot sector of the hard drive, preventing access to the operating system. A bypass password option allows return to normal operation if the asset is recovered.
Administrators can set a curfew for specific assets. If an asset fails to connect to a network for a specified amount of time, it will autonomously execute pre-programmed RemoteKill actions, protecting assets even if they never connect to the internet.
Deploy and manage Windows Bitlocker and Mac OS X Filevault. Stay compliant with data privacy standards using industry-standard OS-native encryption.
More and more IT professionals are choosing to deploy the FDE capabilities built into their operating systems. Windows Bitlocker and Mac FileVault offer excellent performance and compatibility with the widest range of hardware, plus a great integrated user experience. EXO5 lets you leverage these OS-native advantages for a more successful FDE program
Disk encryption can be a disruptive and confusing process for end users. Not with EXO5. A client-side wizard guides users through the FDE process--from announcing your FDE program, to giving users the option to 'snooze' initial encryption until a convenient time, to setting up passwords. EXO5 provides users with a better experience and reduces calls to the help desk.
To comply with data protection regulations such as HIPAA, PCI DSS, and SOX, organisations must prove that data on compromised assets is encrypted. EXO5 provides the audit records and reports you need to establish compliance.
Mass-deploy FDE using asset groups and policies. Delegate authority over groups of assets with administrator roles. Enforce PIN and password complexity requirements with policy-based settings.
Protect smartphones and tablets and address BYOD with ease.
EXO5 supports all popular smartphones and tablets running Android and iOS at no additional cost.
Compromised devices can be locked with a passcode or remotely wiped back to their factory state, preventing sensitive data from getting into the wrong hands.
Collect hardware and software inventory in real-time and extend your data with custom fields.
Administrators can require devices to use a lock screen code, with a system-generated or user-provided PIN.
Make better decisions with real-time asset inventory and powerful reporting capabilities.
Collect essential ITAM data including hardware and software inventory, and network and operating system information. Extend inventory data with custom fields.
Choose from pre-set report templates or create custom reports. RemoteKill® and disk encryption event logs support adherence to privacy regulation and provide crucial proof of compliance to auditors.
RiskSense monitoring identifies usage patterns that may indicate impending asset theft of security lapses, such as non-reporting devices, idle equipment, and unauthorised user changes. Investigate and resolve potential asset compromises before they happen.
Feed EXO5 data to your helpdesk, CRM, ERP, and other enterprise applications with EXO5 data APIs. Eliminate double-entry and deliver accurate ITAM data throughout your organisation.