ANTI THEFT & MOBILE SECURITYTHE MOBILE DEVICE SUITE:
Never lose sight of your devices, recover and protect stolen data, and make sure your fleet stays manageable, no matter if it is on site, or out for remote work.
Tracking & Location
Always Know WhereTrack the whereabouts of laptops, tablets and mobiles, and make sure those that shouldn't be taken off site stay in their place with Control Zones that alert exits or entries.
Tracking Preferences
Active tracking with movement detection and periodic checks, or on-demand locations.
Control Zones Geofencing
Instantly know if a device leaves it's defined area, or if it goes somewhere unsafe.
Tracking by GPS, Wifi Triangulation, GeoIP
The GPS isn't active? Not an issue, we can triangulate it.
Global Device View
Easily see your entire fleet's location at once with the global map view.
Location History
Check for suspicious past positions, or find patterns when looking for a lost device.
Learn more
Device Security
React, Lock, AlertWhen a device is lost and out of your reach, react with security actions to protect and recover your organization's assets, avoiding anyone from accessing it.
Remote Screen Lock
No stranger's hands will access your phone, tablet, or laptop if you remotely lock it.
Message Alert
Not all losses are theft, and not everyone's a thief, try contacting the current device holder.
Anti-mute Alarm
Your device will make a 30-second racket that can't be silenced to help you locate it.
Control Zone Actions
Configure automatic actions, like the lock, alarm, and alert, for when a device enters or exits a specific Control Zone.
Learn more
Data Security
Care About DataProtect your own, and your organization's data with a set of data protection tools that's ready to wipe confidential information and usage data, or retrieve specific files.
Remote Wipe*
Delete cookies, email data, documents, local cloud storage files, and custom directories on lost devices.
*Directory selection varies depending on the OS.File Retrieval
Select and retrieve specific files and avoid losing your work even after the device was stolen.
Disk EncryptionWindows
Activate Windows' full disk encryption tool remotely, BitLocker, to protect data, prevent filtrations, and meet security standards.
Kill SwitchWindows
Press this emergency button for a quick defense. It will destroy the device's Master Boot Record, rendering the device unusable in a matter of minutes.
Factory Reset
This feature remotely restores the device down to factory settings, removing all traces of use from the computer. It’s irreversible, it formats your hard drive and installs the OS all over again. It could take up to an hour.
Learn more
Device Management
Guard BusinessesControl fleets of any size and type. It doesn't matter if they are laptops, tablets, mobiles, or if they are in the office or out of bounds. You can automate their security, and organize them in bulk.
Scheduled Automations
Program recurrent, repeating, or one-time actions to streamline daily tasks, such as a curfew lock.
Mass Actions
Quickly schedule and deploy our lock, wipe, alert, and alarm features to multiple devices.
Enterprise INVENTORY
Keep track and secure device loans, assign permanent users, see hardware changes, and maintain a record of all account activity for visibility.
LABELS AND SEARCH
Group your devices with custom labels, with a robust search engine that can filter by hardware, OS, user, and a lot more.
Fleet Status Dashboard
View your entire fleet's activity globally with graphic insights regarding their movements, recent reports, demographics, and checked-in status.
Custom Deployments
Silent and unattended installers for every OS, automatic updates, and custom APKs.
Developer API
Consume data from your account, develop integrations with third-party platforms, and trigger changes/actions.
Learn more
Missing Reports
Recover With EvidenceThe recovery begins when you mark a device as missing in the panel. The Evidence Reports will activate and deliver crucial evidence for the police, in custom time-frequencies.