BitLocker is only available on Win7 Enterprise.

Betcha they're using Win7 Pro.

On Thu, Jan 31, 2013 at 7:56 AM, John Cook <john.c...@pfsf.org> wrote:
> Just curious as to why not Bitlocker?
>
>
>
>  John W. Cook
>
> Network Operations Manager
>
> Partnership For Strong Families
>
> 5950 NW 1st Place
>
> Gainesville, Fl 32607
>
> Office (352) 244-1610
>
> Cell     (352) 215-6944
>
> MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4
>
>
>
> From: Chinnery, Paul [mailto:pa...@mmcwm.com]
> Sent: Thursday, January 31, 2013 8:28 AM
> To: NT System Admin Issues
> Subject: RE: Mobile Device Management
>
>
>
> +1 on that.  All of our laptops (even ones secured to Medsurg carts) are
> encrypted with Truecrypt.
>
>
>
> From: Cameron Cooper [mailto:ccoo...@aurico.com]
> Sent: Wednesday, January 30, 2013 6:02 PM
> To: NT System Admin Issues
> Subject: RE: Mobile Device Management
>
>
>
> Thanks for the info below.  Since we’ve deployed more laptops recently,
> we’ve encrypted the entire drive with TrueCrypt.
>
>
>
> Regards,
>
>
>
> Cameron
>
>
>
> ___________________________________________________
>
> Cameron Cooper | IT Manager | Aurico
> Direct: 847.890.4021 | Cell: 224.688.2854 | Fax: 847.255.1896
> ccoo...@aurico.com | www.aurico.com
>
>
>
> From: Angus Scott-Fleming [mailto:angu...@geoapps.com]
> Sent: Wednesday, January 30, 2013 3:49 PM
> To: NT System Admin Issues
> Subject: Re: Mobile Device Management
>
>
>
> On 30 Jan 2013 at 20:24, Cameron Cooper  wrote:
>
>
>
>> In light of one of our company laptops being stolen (from the user's car),
>
>> we've been tasked to look for a mobile solution that would allow us to
>> track,
>
>> recover and remote wipe a laptop, tablet and smartphone and would like
>> some
>
>> recommendations on what some are currently using. So far we've looked at
>
>> LoJack for Laptops and Prey (PreyProjects). Thanks, Cameron
>
>
>
> Whole-disk-encryption on laptops is an absolute must IMHO.  That way you're
> only out hardware no matter what.
>
>
>
> The biggest problem with most tracking-and-wiping solutions like Prey is
> that the laptop has to be booted and the OS loaded for them to work. Since I
> use Truecrypt whole-disk-encryption and the password is required to boot or
> to awake after hibernation I don't use Prey.
>
>
>
> LoJack has a version which installs in the BIOS (installed at the factory on
> many bigger brands now, but you have to activate it $$$).  This version
> phones home if there is an active network connection no matter how the
> computer is booted.  But security flaws in the BIOS implementation of LoJack
> for Laptops were documented at a 2009 BlackHat session.  Don't know if
> they're still there.
>
>
>
> This might be of interest:
>
>
>
> Intel® Anti-Theft Technology — What is Intel® Anti-Theft Technology?
>
> http://www.intel.com/support/services/antitheft/sb/CS-030335.htm
>
>
>
> More info:
>
>
>
> LoJack - Wikipedia, the free encyclopedia
>
> https://en.wikipedia.org/wiki/LoJack#for_Laptops
>
>
>
> At the Black Hat Briefings conference in 2009, researchers Anibal Sacco[15]
> and Alfredo Ortega showed that the implementation of the Computrace/LoJack
> agent embedded in the BIOS has vulnerabilities and that this "available
> control of the anti-theft agent allows a highly dangerous form of
> BIOS-enhanced rootkit that can bypass all chipset or installation
> restrictions and reutilize many existing features offered in this kind of
> software."[16][17] Absolute Software rejected the claims made in the
> research, stating that "the presence of the Computrace module in no way
> weakens the security of the BIOS". Another independent analyst confirmed the
> flaws, noted that a malware hijacking attack would be a "highly exotic one",
> and suggested that the larger concern was that savvy thieves could disable
> the phone home feature.[18]
>
>
>
> Core Security Technologies
>
> http://www.coresecurity.com/content/Deactivate-the-Rootkit
>
> Deactivate the Rootkit - Black Hat USA 2009
>
> Link to paper:
>
> http://www.coresecurity.com/files/attachments/Paper-Deactivate-the-Rootkit-AOrtega-ASacco.pdf
>
>
>
> Share your findings back here please.
>
>
>
> HTH
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ________________________________
>
>
>
> CONFIDENTIALITY NOTICE: This email message is intended only for the person
> or entity to which it is addressed and may contain confidential material.
> Any unauthorized review, use, disclosure, downloading, copying or
> distribution is prohibited. If you are not the intended recipient, please
> contact the sender by reply email and permanently delete all copies of the
> original message. If you are the intended recipient but do not wish to
> receive communications through this medium, please advise the sender
> immediately.
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>
> ________________________________
>
> CONFIDENTIALITY STATEMENT: The information transmitted, or contained or
> attached to or with this Notice is intended only for the person or entity to
> which it is addressed and may contain Protected Health Information (PHI),
> confidential and/or privileged material. Any review, transmission,
> dissemination, or other use of, and taking any action in reliance upon this
> information by persons or entities other than the intended recipient without
> the express written consent of the sender are prohibited. This information
> may be protected by the Health Insurance Portability and Accountability Act
> of 1996 (HIPAA), and other Federal and Florida laws. Improper or
> unauthorized use or disclosure of this information could result in civil
> and/or criminal penalties.
> Consider the environment. Please don't print this e-mail unless you really
> need to.
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to