RSA SureFile combines RSA's encryption technology alongside PKWARE's PKZIP to create an encryption product that also compresses files and folders to save space and bandwidth. Because encrypted files are generally fairly random looking, they are incompressible by hardware that may be part of a bandwidth-saving infrastructure. So, it is better to compress files before encryption, or optimize both processes within one product as RSA Security has done.
Adhaero Doc is not a general-purpose encryption product, but it uses encryption technology to secure Microsoft Office files throughout their lifecycle. It also integrates with Microsoft Outlook to provide the same protection to emails. It is best described as a digital rights management product.
PC PhoneHome differs from the other tracking solutions in that it does not require an annual subscription and is totally self sufficient, reporting not to a tracking center but to the laptop owner. This reduces the cost and ensures a user can pass information onto the law enforcement officer as quickly as it is received.
The smallest Group Test product was the MSX-256 Memory Stick PRO. It comes in a small, neat, case. The documentation was not very helpful and, had we not used this type of hardware before, we may have become stuck, because the case itself was not that easy to open. Apart from this minor setback Memory Stick compatible hardware is also required, whether using a laptop, PC, digital mobile phone or digital camera. That said, a PC card adapter or a USB reader/writer is all that is needed for laptop use and, given the protection that is afforded, it's a small price to pay.
As with the BioPico, PicoDisk TECH 2 requires no driver installation for Windows 2000, Me or XP and it is only when using Windows 98/SE or Mac operating systems that drivers must be installed from the CD provided.
The TECH 2 is a small USB token similar to the iKey design many people are familiar with and a USB extension cable for those hard to get at USB ports on many PCs.
With seven years behind it, Cyber Angel software has developed into a neat little package, which, apart from its tracking capabilities, also offers a CyberAngel Secured Drive. This requires password authentication but, once in, allows the user to keep all confidential data in total privacy in this protected drive. With on-the-fly encryption, the user does not need to worry about any data being revealed if the laptop falls into the wrong hands, using a choice of encryption algorithms to protect it such as Rijndael - AES 128 or 256 bit encryption, Blowfish 128 or 448 bit, Twofish 128 or 256 bit, Triple DES or DES. The virtual drive created by CyberAngel is accessed with the users password and is supported by 32-bit device drivers for fast access with little or no drop in performance.
Having a laptop stolen can be stressful and demoralizing. But for many well-prepared, security conscious company executives it needn't be. ComputracePlus is an asset tracking software solution that can help to ease the problems associated with this type of loss, it can put control into the hands of the law enforcement officers that are assigned to your case and aid a swifter recovery. There is a high incidence of internal thefts reported with no way of catching the people responsible. But if employees also know that all equipment owned by their employers is easily traced through a solution such as ComputracePlus, many thefts might not occur.
The tough Notebook Guardian certainly appears sturdy on initial visual contact - from lock to cable. It is made of steel with a strong looking keyed lock function, although PC Guardian does manufacture other locking choices such as the combination version illustrated. The cable is black vinyl coated and blends into the surroundings. We are still waiting for a manufacturer to use Day-Glo colors, which would certainly say "hands off."
ABSPlus is probably better know in the backup and recovery market and so it will be little surprise that what we are now looking at is exactly that - and more. It is an ideal storage unit to regularly back up all laptop data. With the software supplied the device becomes the complete backup and restore, disaster recovery solution.
RemotelyAnywhere is a relatively late arrival to the remote access software landscape. Despite this, the package is arguably the most complex currently available on the market, offering the IT professional full access to a remote machine's facilities, even allowing a full reboot on the fly.
The Cloud, a division of Inspired Broadcast Networks, is something of a low profile public Wi-Fi network, preferring to stay in the background as a wholesale wireless network operator.
When the service was launched earlier this year, the company offered access through two options, pay-as-you-use sessions from a variety of outlets, or through third parties, such as BT OpenZone, whose users can now roam seamlessly onto The Cloud's network.