Jul 16 2010
Security

Anti-Theft Measures

Government agencies often use technology in locations that have a lot of public access, making IT assets prime targets for theft or misuse. Even if your tech gear is not easily accessible, the data stored on it might make some of these items alluring (possibly to internal threats). Plus, there are portable devices that feds take on the road, such as notebook PCs and projectors, that need safekeeping. Here are a few theft-deterrent tools to help you safeguard your IT wares.

1. ALARM: If someone cuts or unplugs the cable attached to your PC, monitor or projector, the Sonic Shock Sound Alarm siren screams

for up to two hours and can’t be stopped without a key.

 

 

 

2. PRINTER: The Troy 3015dt Security Printer offers two trays with locks to provide additional security for check-printing applications. Additional fraud-deterrent features include user authorization to print confidential data files and the ability to direct confidential data transmissions to specific paper trays, among others.

 

 

 

 

3. LOCK KIT: Protect your projector from being purloined with the Chief LC1 Cable Lock Kit. The package includes a coiled cable, two steel security pads, super glue and a padlock.

 

 

 

4. CABINET: Store notebook computers safely with the PSSI Dock & Lock 2052-L-10 notebook security cabinet. The cabinet charges stowed notebooks and features multiple fans for cooling, making it ideal for libraries, operations centers and classrooms or training facilities.

 

 

 

 

5. THEFT RECOVERY: Absolute Software Computrace LoJack for Laptops Premium can track, locate and recover lost or stolen computers. Should a computer go missing or fall into the wrong hands, IT can remotely delete sensitive files.

 

 

 

6. CABLE LOCK: The Kensington MicroSaver Alarmed Computer Lock reinforced steel cable protects desktops, mobile computing devices, flat-panel monitors, projectors and other peripherals. The alarm sounds instantly if the cable is cut and can be heard from up to 50 feet away.

 

 

 

Close

Become an Insider

Unlock white papers, personalized recommendations and other premium content for an in-depth look at evolving IT