Call a Specialist Today! 800-886-5369

InterGuard Laptop Recovery
InterGuard is the best laptop protection software in the industry.

InterGuard Data Loss Prevention - The only solution with NO Hardware Required

InterGuard Laptop Recovery
Laptop Recovery
InterGuard Laptop Recovery, 1 Year, 1-10 Users
*Price per user. Minimum quantity is 1.
#ATILAPTOP-ARR-1-10
Our Price: $55.00
InterGuard Laptop Recovery, 1 Year, 11-25 Users
*Price per user. Minimum quantity is 11.
#ATILAPTOP-ARR-11-25
Our Price: $49.00
InterGuard Laptop Recovery, 1 Year, 26-100 Users
*Price per user. Minimum quantity is 26.
#ATILAPTOP-ARR-26-100
Our Price: $43.00
InterGuard Laptop Recovery, 1 Year, 101-500 Users
*Price per user. Minimum quantity is 101.
#ATILAPTOP-ARR-101-500
Our Price: $39.00
InterGuard Laptop Recovery, 1 Year, 501-1,000 Users
*Price per user. Minimum quantity is 501.
#ATILAPTOP-ARR-501-1000
Our Price: $35.00
InterGuard Laptop Recovery, 1 Year, 1,001+ Users
*Price per user. Minimum quantity is 1,001.
#ATILAPTOP-ARR-1001+
Our Price: $33.00

Click here to jump to more pricing!

Overview:

InterGuard is the best laptop protection software in the industry. It protects organizations from financial and operational impacts of laptop theft by making the contents on a lost or stolen laptop accessible to the laptop owner, but not to the thief. InterGuard allows you to identify, track, and control who accesses data on a stolen laptop, what data is accessed, and what can and cannot be done with that data. InterGuard's single agent can be installed either at the time of laptop purchase or anytime afterward. It deploys and operates invisibly. When a laptop is lost or stolen, the InterGuard agent can be activated instantaneously by the rightful owner using any web browser.

The contents on the missing laptop can now be visualized and managed remotely in real time, on that web browser, without alerting the thief. This allows the owner to retrieve any and all files from the laptop, where they can be stored centrally or downloaded to another computer. Files, or the entire hard drive, can also be deleted. The data is deleted to the U.S. government’s 5220.22-M standard featuring multiple overwrites, random characters, and write verification. Laptop Cop sends back a confirmation that the files were deleted successfully.

InterGuard also provides real-time geo-location based on wi-fi hotspot tracking, which gives a higher degree of accuracy than GPS in most urban and suburban locations.. This evidence assists law enforcement in the recovery of a lost or stolen laptop, and is a far superior recovery method to simply trying to track by a computer’s IP address, which is fraught with problems. Because the IP address’ physical location can only be known by the ISP, it can take weeks or months in some cases to locate an address by this method. By that time, the computer is often in a totally different location.

Recent research shows the majority of lost or stolen laptops contain confidential company communications and information. Recent research has shown that laptop theft is now judged by CTOs to be the highest risk area for the loss of valuable company data. There are many partial solutions, including encryption and mapping data on laptops. None can restore lost data to its rightful owner. InterGuard can.

Geolocation Diagram

How It Works

Laptop Recovery Features:

Laptop Cop is an invisible piece of software that provides secret access to your computer remotely over the Internet no matter where the thief takes your computer. By being able to take control of your laptop without the thief's knowledge, you will be able to locate and recover your computer immediately.

Real Time Notifications

Geolocate Your Laptop

Geolocation feature offers real time laptop geo-tracking that is more accurate than GPS. Other tools attempt to locate computers via an IP address, this pratice is time consuming and requires a warrant.

Bandwidth Utilization

Retrieve & Delete Files

The files on your stolen laptop are usually much more valuable than the laptop itself. With Laptop Cop, once your laptop is stolen, you'll be able to remotely access your stolen computer without the thief's knowledge and copy any files or folders that you would like to retrieve from the laptop.

Web Searches

Monitor & Control

Once a computer is stolen, you can activate Laptop Cop to begin recording all activity on that computer. You will see everything that the thief does, including personal logins, emails, instant messages, keystrokes, screenshots, etc.

InterGuard User Interface (click on the images to enlarge)

Locate Laptop

Locate Laptop

Retrieve Files

Retrieve Files

Delete Confidential Data

Delete Confidential Data

Laptop Recovery Benefits:

  • Prevents damaging data breaches resulting from lost or stolen laptops
  • Quick deployment to protect your organization’s at-risk data on laptops
  • Reduces business risk by responding in real-time to threats to confidential data on laptops
  • Easily installs and deploys for low TCO
  • Helps ease regulatory compliance efforts with centralized analysis and reporting
  • Ensures data privacy and integrity
  • Protects critical company data, maintains budgets, and achieves operational efficiencies across the board
  • Works in terminal server and Citrix environments
Key Internal Threat Statistics

90 min

of an employee's workday is spent on non-work related computer activity.

59%

of employees walked out with company information upon exit.

600K

laptops are lost or stolen annually in the USA. Only 3% are recovered.

70%

of security incidents that incur losses are caused internally.

Technology:

InterGuard is easily implemented. It can be installed at the time of laptop purchase, or anytime thereafter. Installation can be done either on a single computer, or across an entire organization using software deployment tools.

InterGuard is built on Awareness Technologies’ patented Single Agent technology. This core unified footprint and low memory utilization do not impact end-user function or performance. The agent communicates using secure internet protocol, allowing all data to be accessed and settings configured using any web browser.

Once activated in the case of laptop loss or theft, InterGuard runs undetectably, so a thief won’t notice it operating or be able to uninstall. InterGuard is managed from a single management console, simplifying the recovery and deletion of confidential data.

System Requirements:
Hardware Requirements:
  • 733 MHz CPU or faster
  • 1238 MB RAM
  • 20 MB hard drive space
Software Requirements:
  • Windows XP
  • Windows 2000
  • Windows Vista

Videos:

Please click the video below to learn more about how InterGuard's Laptop Recovery can help your organization with internal data leakage.

Laptop Recovery video

Frequently Asked Questions:

Q. Where do I log in?

Answer: You can log in at www.sonarcentral.com

Q: I can only see data from the last two days; how can I view older data?

Answer: By default, the user interface will show the last two days of data. If you would like to see data recorded prior to that all you need to do is expand the date range to show data beyond two days. When viewing Recorded Data or the Dashboard, you will see a 'To' and a 'From' date field on the top right side of your account window. Simply enter the desired dates and click the green 'Go' button. The window will refresh and display the new data based on your new date selection.

Q: I don’t see any screenshots; how can I configure the software to take screenshots?

Answer: The software has two utilities that can record screenshots of the monitored user’s activity; Smart Camera and Alert Words. Each requires that you configure settings to trigger screenshots. You may not see any screenshots, because there may not be any triggers configured in the Smart Camera or Alert Words settings.

You can configure either Smart Camera or Alert Words by going to the Settings section of your account and selecting Recording & Blocking. On the right of the Recording & Blocking page you will see several on/off switches for the various monitors, included Smart Camera and Alert Words. Make sure that the desired monitor is on. By clicking the Settings link next to Smart Camera or Alert Words you can configure their settings.

Q: How can I view data from only one user?

Answer: Your account has an Advanced Filter that can be used to narrow down the recorded data. You can use it to display only data from a specific computer or Windows user logon. To display the advanced filter while viewing Recorded Data or the Dashboard, click the “Advanced Filter” link located on the top right of the window. There are a variety of filter options with a drop down menu next to each. If you want to filter by computer, click the dropdown next to Computer, and select the desired name. If you want to filter by Windows username, do the same, but select the dropdown next to Logon. Then click the green Go button. Your Advanced Filter settings will remain in place until you log off your account or change the Advanced Filter Settings.

Additionally, when viewing Recorded Data, there is a grouping tool. The left most frame of the Recorded Data section displays grouping options. By selecting an item displayed in grouping, your Recorded Data will be filtered by those criteria. You can change the criteria in grouping by clicking the “Group by” button located just above the grouping frame. Amongst the various criteria, you will find a option for Computer or Logon. By selecting one of these options you can use grouping tool to display data based on computer or Windows username.

Q: Websites are not being blocked; how do I block websites?

Answer: The software’s website blocking feature is on by default, however you will need instruct the software as to what website to block. Go to the Settings section of your account and select Recording & Blocking. You will see several on/off switches for the various monitors, including Block Websites. If it is not already configured, click On next to Block Websites. This will open a new window where you can configure the software’s website blocking utilities. You can block based on website categories or by entering a website domain (facebook.com for example). The software can also be configured to scan the text of websites and block sites that contain words phrases that you have selected. Lastly you can configure the software to block all websites, and allow sites that you have selected. For specifics on each blocking utility please consult the user guide available in the help section of your account.

Q: How can I export my data?

Answer: When viewing Record Data, click on the “Export” button located above the grouping and summary frames, and then chose the desired export type and the desired format. There are two kinds of exports; summary and detail. The summary export is an overview that will provide the basic information about the recorded data, but it will not include details of recorded events. This export is very similar to what is displayed in the summary frame.

The Detail export will list each recorded event individually and include the details.

In the case of both export types, only the events that are currently being displayed according to your date and advanced filter settings will be exported. Please note that export only respects the date and advanced filter; it does not respect any grouping options. Data will be exported regardless of your Group By selections.

Q: How can I view summaries or reports of the recorded data?

Answer: If you are interested in summaries and reports based on your recorded data, take a look at the Dashboard in your account. The Dashboard contains a variety of different summaries and reports; we call these items Widgets. Each widget can be displayed in a variety of formats, graph, table, pie chart, etc.

There are six widgets displayed by default. However there are many more Widgets available to you. You can select which widgets you would like to display on your dashboard by clicking Manage in the Dashboard section of your account. A new window will pop up listing the available widgets in the left frame and the currently visible widgets in the right frame. Currently visible widgets are the ones that will be displayed on your dashboard. To add a widget to your dashboard select it from the Available list and click the right facing arrow. To remove a widget from your dashboard select it from the Currently Visible list and click the left facing arrow. When you are done adding or removing widgets, click the Ok button. For more specific details on each widget, please consult the user guide available in the help section of your account.

Q: How can I create different recording and blocking policies for different monitored users?

Answer: You can accomplish this by using Groups in your Recording & Blocking settings. Groups are a simple way to create unique Recording Options rule-sets and assign Windows users or entire computers to the each rule-set. This means you can designate unique recording options for each Windows user or group of Windows users, each computer or group of computers, or a combination of Windows users and computers.

To manage groups, go to the Settings section of your account and select Recording & Blocking. You will see a Groups section in the middle of the page. To create a new Group, enter the name of the new Group in the Add Group text box and click the Add button. New Groups contain no members. To add members to the group, highlight the desired Group then click on the Members tab on the right. This will display the members of the group, however if it is a new group it will be blank. To add members, click the Add Member Button. A search utility will open up that will allow you to search for computers or Windows users recorded by our software. Simply select the desired items and click the Add button. Users and computers can only be in one group at one time, so when you add a member to a group, that member is also being removed from its previous group.

Since each group has its own unique settings, simply apply the desired settings to your new group and only members of that group will be affected.

Q: How can I silently deploy the software to computers on my company network?

Answer: Awareness Technologies can build an unattended (silent) executable for your account. This unattended executable does not require any user interaction and will not display an installation wizard. It installs in the back ground and registers the software automatically. We offer an unattended executable so that you may have some flexibility in your deployment.

There are a variety of tools that an administrator can use to deploy executables to computers on their network. Just about all methods will work find with our unattended executable. If you don’t already have a deployment tool, we generally recommend PsExec which is available for free from Microsoft System Internals. It is a lightweight simple command line utility that doesn’t require any software to be pre-installed on the target computers. For more information on PsExec, please see the link below:

Please contact your sales rep or account manager for more information on how to obtain an unattended executable built for your account or for more information on using PsExec to deploy our software.

Q: How long does it take for recorded data to show up in my account?

Answer: After an event has been recorded the software will attempt to upload the data to your account right away. The amount of time that this takes will vary depending on the bandwidth and system resources available at that time, but generally it only takes a minute or two. If the computer is being used offline, recorded data is still captured and is stored until by the software until the computer goes back online.

Different data types are recorded at different intervals, so some data types will show up in your account sooner than others. For example, websites are recorded when the user leaves a website or when the internet browser window is closed while keystroke records are updated every several minutes, therefore it is possible to see a recorded website show up in your account before any keystrokes recorded from that same user activity.

Q: How long is the data stored in my account?

Answer: All of the recorded data is stored in your account for at least 14 days at no charge. It will remain in your account until it becomes 14 days old, or until you delete it. If you want to keep the data longer, you can purchase Data Storage subscription. Data Storage can be purchased in your account by going to the Settings section and selecting Subscriptions.

Q: How do I change my password?

Answer: To change your password, go to the Settings section of your account and select User Access. Click the Edit Password button.

Documentation:

Download the Laptop Recovery Overview (PDF).

Pricing Notes:

InterGuard Laptop Recovery
Laptop Recovery
InterGuard Laptop Recovery, 1 Year, 1-10 Users
*Price per user. Minimum quantity is 1.
#ATILAPTOP-ARR-1-10
Our Price: $55.00
InterGuard Laptop Recovery, 1 Year, 11-25 Users
*Price per user. Minimum quantity is 11.
#ATILAPTOP-ARR-11-25
Our Price: $49.00
InterGuard Laptop Recovery, 1 Year, 26-100 Users
*Price per user. Minimum quantity is 26.
#ATILAPTOP-ARR-26-100
Our Price: $43.00
InterGuard Laptop Recovery, 1 Year, 101-500 Users
*Price per user. Minimum quantity is 101.
#ATILAPTOP-ARR-101-500
Our Price: $39.00
InterGuard Laptop Recovery, 1 Year, 501-1,000 Users
*Price per user. Minimum quantity is 501.
#ATILAPTOP-ARR-501-1000
Our Price: $35.00
InterGuard Laptop Recovery, 1 Year, 1,001+ Users
*Price per user. Minimum quantity is 1,001.
#ATILAPTOP-ARR-1001+
Our Price: $33.00