Unistal Unveils Protegent 360, Theft protection for Laptops

07.11.2008
Unistal Systems has announced the launch and availability of a new unique security software product for Laptops called Protegent 360. Powered by two of Unistal's indigenous products -- Locate Laptop and Port Locker -- and coupled with Internet Security 2009 from BitDefender, Protegent 360 is the most comprehensive and integrated security and theft protection system made for laptops ever. All BitDefender products are internationally certified by Virus Bulletin, ICSA Labs, Checkmark, IST Prize and various other internationally recognized labs.

According to Alok Gupta, Director, Unistal Systems, "Laptop thefts and loss, information and file leakage, data loss and disruption owing to lack of Internet security etc., are on an incessant rise. Despite all this, there was no fool-proof, comprehensive and integrated security cum theft protection product for laptops in sight. Unistal once again proved the theory right that necessity gives birth to invention. And as a result we bundled our indigenous products with that from BitDefender, a brand that provides complete threat management to over 41 million home and corporate users across 200 countries worldwide. There is an immense potential to be tapped. We intend filling this large void and making Protegent 360 the de facto standard when it comes to security, theft protection & data leakage for laptops."e--

Locate Laptop, one of the three software product elements in Protegent 360 not only tracks & recovers stolen computers -- it deters theft. It keeps track of the whereabouts of each employee while traveling and the moment he logs in via the web, a report is generated with his complete details and is sent to a designated individual within the organization. This is done without the knowledge of the employee, so as to maintain privacy. It resides and operates in stealth mode. Authorized users may login to their web-based Personal Tracking and Monitoring Page through www.locatelaptop.com to view and trace where their laptop has been accessed from.

In an event of theft or loss, the user needs to report to Unistal's emergency response team or login to their Personal Tracking and Monitoring Page and submit the theft/loss. This activates Locate Laptop's proprietary WebSniff technology and alerts as soon as the offender connects to the Internet. The city and IP address are informed to the user. It keeps tracking all the locations whenever the offender connects to the Internet. With the help of local law enforcement authorities users can retrieve their laptop. Traditional IT asset management systems can lose track of laptops when they drift to unknown locations or are not connected to the LAN. With the help of WebSniff the IT department has access to their computer asset base whether on the LAN or connected via the Internet. Laptops also report changes in asset information regardless of their location. With the computer recovered and the perpetrator identified, the scope of the information breach can be defined and swift corrective action can be taken. Locate Laptop is also having a feature of automatic data encryption if not connected to internet for a specified time. This feature minimize the unauthorized use of user data.

Port Locker, the second of the three software product elements in Protegent 360, prevents data theft, information and file leakage by stopping vital and important data to be transferred from laptops using flash drive, DVD/CD writers, PCMCIA ports, Ethernet ports (network ports) etc. It blocks ports when PC is idle or in scheduled durations to prevent unauthorized access. Authorized users can open single or multiple ports using secure password.

BitDefender Internet Security 2009 keeps Internet-connected laptops safe, without slowing down their performance. It locks out viruses, hackers & spam, while providing parental control and firewall protection as well. It allows users to confidently download, share and open files from friends, family, co-workers - and even total strangers! It not only scans all web, e-mail and instant messaging traffic for viruses and spyware, in real-time but also proactively protects against new virus outbreaks using advanced heuristics. Users can shop, bank, listen, watch privately and securely as it protects their identity and blocks attempted identity theft (phishing). It prevents personal information from leaking via e-mail, web or instant messaging. It guards conversations with top-of-the-line instant messaging encryption. Its unique File Vault securely stores personal information or sensitive files.