There have been some changes in the marketplace that Fischer anticipated and had the technology ready to address.
Identity Finder starts with a very simple premise: If you want to keep data from leaking, protect it where it lies. That way, if someone steals it, they get nothing. As simple as that sounds, it’s a bit harder to execute.
The appliance can be accessed through SSH, but only the customized Rohati commands are available, and there are no services turned on that are not TNS-specific. No daemons, which are not needed for the TNS to operate, are present either. This improves the security of the device itself. If you are managing access to and use of specific sensitive resources — and who isn’t — give this product a very close look.
If pressing Ctrl+Alt+Del to lock Windows every time the weary computer user leaves their desk proves too much of a strain then this new device from Sitecom could be just the ticket.
The Wireless PC Lock is billed as a convenient aid for protecting personal details and programs when away from the PC or laptop. A receiver is connected via a USB port to the computer while a transmitter is placed upon the person. Should the transmitter and receiver be more than two metres apart then the PC will lock.