Bell rings mobile computing security changes
New technology designed to locate lost devices and then delete data in 180 seconds
The Security division of Bell Micro has signed a
The result, says
Once the mobile computing security protocols have been activated, BackStopp generates a report of any data accessed, confirms the data it has deleted and then sends the report to the Virtuity hosting centre. The service will then render the laptop’s operating system completely useless. If a webcam is available on the host device it will send a command to photograph the unauthorised user.
“If the national press taught us just one thing last year, it would be the importance of securing data on the move,” commented Steve Browell, General Manager, Security Division at Bell Micro. “Protecting data and bringing in encryption for data at rest and in transit, whether on PDA or especially on laptops is a driving need in modern business.”
BackStopp is designed to complement firms’ anti-virus, personal firewall, encryption and remote access solutions. Offered as a 24/7 ‘cloud service’ BackStopp, says
Click here for more information on '2187327;BnId=1;link=http://cde.cerosmedia.com/1S4909a54150b5d012.cde">'how mobile computing solutions enhance business productivity