Data Vault Security 'Sentry' is a 24/7 insurance policy that is active anywhere in the world where there is a mobile phone signal. There are some outdated tools that go part of the way to achieving what 'Sentry' does but they rely on the laptop being connected to the internet, claiming that a stolen laptop is soon connected to the web. For Data Vault Security soon isn't good enough. The data could well be long compromised by then.
Data Vault Security 'Sentry' starts tracing and locating the laptop as soon as it is turned on and deleting the data before the boot sequence is completed.
What is ‘Sentry’?
Laptop sales have now overtaken desktops as the world becomes ever more mobile and high speed internet access encourages an increase in home working.
At the same time PDAs and mobile phones are getting more powerful, cheaper and increasingly used in business as mini PCs and for sending and receiving information.
Whatever procedures an individual or organisation may have in place regarding data security it is inevitable that valuable and sensitive data will be stored on those devices and that data will be mobile. If the laptop is lost or worse stolen can you be absolutely sure that the data will not be compromised?
Statistics on how many laptops, PDAs and Mobiles phone are being stolen or lost per year differ widely. It is reported that some 4,973 laptops were left in London taxis alone during a six month period.
When a laptop goes missing just how confident can its owner be that the data on it will not be compromised? Data Vault Security ‘Sentry’ is an ingenious layer of insurance that helps an individual or organisation reach a level of confidence that when the hardware has disappeared, the real value, the information, is safely dealt with.
Using either GSM or internet communications methods ‘Sentry’ is able to securely delete predefined data contained on the laptop’s hard disk and send a comprehensive report back to the operator confirming its success. Our ‘Sentry’ can locate and destroy all types of data from client records, e-mail and contact files, word processor or spreadsheet documents or even cookies. The value of this data is often not considered until there is the possibility that somebody else has it.
Data Vault Security ‘Sentry’ is a 24/7 insurance policy that is active anywhere in the world where there is a mobile phone signal. There are some outdated tools that go part of the way to achieving what ‘Sentry’ does but they rely on the laptop being connected to the internet, claiming that a stolen laptop is “soon connected to the web”. For Data Vault Security soon isn’t good enough. The data could well be long compromised by then.
Data Vault Security ‘Sentry’ starts tracing and locating the laptop as soon as it is turned on and deleting the data before the boot sequence is completed.
Many high profile cases have resulted in dreadful negative publicity and in some cases have breached the personal security of individuals. Data Vault Security ‘Sentry’ can turn this on its head and allow an individual or organisation affected by laptop theft to be reassured its personal/customers/stakeholder/employees data is secure and furthermore that effective measures were taken to protect the information and turn a negative into a positive.
How does Data Vault Security ‘Sentry’ work?
Data Vault Security ‘Sentry’ allows organisations and individuals to ensure the secure deletion of data and files on any PC, Laptop, PDA or Mobile phone that is lost or stolen utilising either the GSM Network, Internet or RFID.
Off-premises
As soon as you realise your device is stolen, either notify your ‘Sentry’ operator or login to the Data Vault Security ‘Sentry’ Control Panel. Upon receiving a secure decommission message all data and critical system files on the lost or stolen device will be destroyed using US Department of Defence Standard disk erasur
3. What is ‘Sentry’ ‘Sentry’ is a simple but effective tool that securely eradicates computer data that may be at risk of moving out of its owner’s control.
9. Equally employees store an organisation’s information at a third party site for use post employment.
10.
11.
12. It eliminates human error by having no user interaction, there are no passwords to enter or programmes to start, ‘Sentry’ is always working when the computer is.
16. End users often render these tools useless by recording the password and storing it or the plug in device, with the laptop, stripping the tool of its functionality.Protected data is good, NO data is best. ‘Sentry’ deletes ALL data, protected or not.
17. The ‘Sentry’ Process Data Vault Security ‘Sentry’ Issues Self Destruct Command To Required Computer. Authorised Internal ‘Sentry’ Operator or Data Vault Security is asked to destroy a particular device. Device receives ‘Sentry’ delete Instruction and shuts down. Whatever the circumstance, Panic, Critical or Controlled ‘Sentry’ works in the same way. The authorised operator identifies the relevant device through the ‘Sentry’ service and quickly issues a request to erase all sensitive data. When the command reaches the device the data is eradicated and the proof is delivered to the relevant parties almost immediately.
26. The ‘Sentry’ comprehensive decommission report proves that the data cannot be compromised and that the measures taken to achieve this have succeeded.
27. The report shows a list of ALL files deleted, when, and very importantly, whether any were accessed in the time that the device was missing and unreached by ‘Sentry’.
31. ‘Sentry’ is always active when its host computer is. When it receives a decommission instruction ‘Sentry’ works quickly to leave the computer risk free.
32. On a typical computer ‘Sentry’ can destroy 500 MB of data made up of more than 4500 documents (2380 Word docs, 2127 Spreadsheets and several hundred emails) in 103 seconds, too fast for the data to be seriously compromised.
33.
34.
35. ‘Sentry’ integrates with leading data back up tools to provide an excellent route back to productivity in the shortest time possible.
36. ‘Sentry’ can be used as a proactive tool, for example with its device vacation functionality that searches for the device in designated downtimes such as user holidays.