Laptop Cop Review
Laptop Cop protects your computer and the sensitive information contained on it by allowing you to remotely access your laptop in the event that it is ever lost or stolen. Laptop Cop is a part of the InterGuard security suite made by Awareness Technologies.
With Laptop Cop you'll be able to instantly locate your computer on a map no matter where it goes, retrieve and delete files remotely, record and control the thief's activity on the computer, and physically recover the computer - often times without needing to obtain a search warrant. Additionally, with one remote command Laptop Cop lets you render your PC useless by locking down access to everything on the computer.
No matter where the computer goes after it has been stolen, Laptop Cop can locate it to within 60 feet - making it more accurate than GPS. It also allows you to remotely access the laptop without the thief's knowledge so that you can copy any files or folders that you would like to get back. You can retrieve photos, important documents, private records, etc. You can even remotely delete any or all of the files on the stolen computer to the US Department of Defense standard to ensure they can never be recovered or viewed ever again - ensuring that your identity and your private data are secure. Laptop Cop is the ultimate ant-theft system for your computer.
In the event of a laptop theft or loss, Laptop Cop allows you to:
- Remotely retrieve files
- Remotely delete files
- Monitor and control the thief's activity
- Recover your laptop with the help of the Laptop Cop recovery team
How To Remotely Retrieve Files:
You can remotely retrieve any desired files from your stolen computer. Simply click on the link in the left hand navigation titled "Retrieve Files" and submit a file retrieval request. Once the request is submitted we will begin the retrieval process immediately and we will hold your files on our server until you provide us with a police report. Once we receive a valid police report we will make the files available for download.
To avoid long download times and a delay in file retrieval, Awareness Technologies encourage you to submit your file requests in several small groups rather than trying to grab all of your files at once. This will significantly speed up the retrieval process and increase your chances of success.
How To Remotely Delete Files
You can remotely delete any desired files from your stolen computer. Simply click on the link in the left hand navigation titled "Delete Files" and submit a file deletion request. Once the request is submitted, Laptop Cop will instantly send the command to the stolen computer to begin the deletion process. Once the files have been successfully deleted you will receive a confirmation from the computer that the process was successfully completed.
How To Recover Your Laptop
To begin the recovery process, simply click on the "Recover My PC" tab and report the computer as stolen. Once the computer is reported as stolen, Laptop Cop will immediately begin recording everything the thief does on the computer. Monitoring the thief's activity often leads to ascertaining personally identifiable information on the thief. This information is critical to successfully recovering the PC.
How To Monitor and Control the Thief's Activity
You can monitor and control any and all of the thief's activity. Monitoring the thief's activity often leads to ascertaining personally identifiable information on the thief. This information is critical to successfully recovering the PC. This will also allow you to see what the thief is doing with the laptop, and will help you prioritize file retrieval, deletion and laptop recovery. To begin the monitoring process, simply click on the "Recover My PC" tab and report the computer as stolen. Once the computer is reported as stolen, Laptop Cop will immediately begin recording everything the thief does on the computer.
Laptop Cop can be a savior if a laptop is ever lost or stolen. It is just a matter of time before it happens within your organization and you know there is a lot of sensitive data on the computer that is not intended for anyone outside of the organization. Install Laptop Cop on all of your mobile laptops before it is too late. You will be glad you did.