LoJack Comes To Android Tablets - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile // Mobile Devices
News
4/11/2012
11:03 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

LoJack Comes To Android Tablets

Computrace adds persistent theft recovery features into Android firmware for Lenovo ThinkPad tablets.

Absolute Software, creators of the LoJack for Laptops anti-theft system, is now adding firmware-level anti-theft technology to a raft of new and upcoming Android devices. The first partner: Lenovo, courtesy of its new ThinkPad Tablet.

Yesterday, at an otherwise NDAed Lenovo industry event in New York City, Absolute Software's senior product manager Geoff Glave demonstrated and explained Computrace, their "persistence module" technology for Android (and other platforms as well).

A theft-recovery and device-tracking agent was embedded into the copy of Android running on the tablet. Devices not only can be physically located but remotely wiped, frozen, or have data selectively retrieved. The real advantage: the agent is also present in the device's recovery firmware. If a thief steals the device and reinstalls the OS or even swaps out the hard drive, the firmware will reinstall the tracking agent software so the device can still be recovered.

All-software solutions such as Prey suffer from the disadvantage of being, well, all software: a factory reset will remove the tracking application. Because Computrace is part of the firmware shipped with the device, it remains consistently present even after a factory reset. The software also provides IT managers with the means to comprehensively track, overview, and manage all devices in their fleet that have Computrace.

What about rooting the device, via a custom firmware such as Cyanogenmod? There, unfortunately, all bets are off: a rooted device could in theory have its firmware erased and replaced, and render Computrace ineffective. That said, Glave noted the ThinkPad tablet he was using for the demo had not yet been rooted, due to the DRM and other security measures in place (for NetFlix, among other things).

Device loss or theft aren't the only useful applications for Computrace. Another scenario is what Glave called "pre-loss" or "pre-theft": employees who deliberately walk out the door with their devices if they're fired, along with the data on it. Glave claimed they recover some 100 to 200 devices a week: "Better than 50% of them are internal thefts."

Not all such internal thefts are corporate malfeasance, either. Some of them involves scenarios where an employee lifts a device, "accidentally" loses it, wipes it, and then gives it to a relative.

Absolute Software has theft-recovery code in the firmware for many other name-brand PCs as well: Dell, HP, Acer, Fujitsu, Asus, Panasonic, and Samsung, among others. Lenovo was the first company it had partnered with to add its anti-theft code to Android tablets. Glave said the company would be announcing shortly a partnership with another major PC manufacturer that is adding Android-powered tablets to its lineup. Android phones, especially mid- to high-end models such as the Samsung Galaxy line, are another possible future target.

Home users who want to reap some of the same benefits, sans the firmware-level persistency, can use Lojack for Laptops on their Windows-powered devices. One year of protection starts at $29.99. The standard edition includes the ability to track, lock, erase, and recover a stolen device; the premium edition of the service includes a $1,000 guarantee that the device can be recovered or remotely erased if stolen.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
anon4502624740
50%
50%
anon4502624740,
User Rank: Apprentice
3/24/2014 | 1:51:32 PM
Re: LockItTight
well Appreciated this thought and the idea you have just given....
kiahaalhaitera
100%
0%
kiahaalhaitera,
User Rank: Apprentice
3/24/2014 | 12:55:55 PM
Re: LockItTight
yes I would like to argue about it too because Lojack is way to expensive there are times when you dont need that much expensive applications in you Phone. However there are many other such as above mentioned LockItTight it is quite a simple and easy to use application.
kiahaalhaitera
100%
0%
kiahaalhaitera,
User Rank: Apprentice
3/24/2014 | 12:48:55 PM
LockItTight
LockItTight is another better enhanced application it doesnt give you that much benefits but yes in many ways better than any other similar applications. its less intrusive and have better support than any other.
Slideshows
IT Careers: Top 10 US Cities for Tech Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/14/2020
Commentary
Predictions for Cloud Computing in 2020
James Kobielus, Research Director, Futurum,  1/9/2020
News
What's Next: AI and Data Trends for 2020 and Beyond
Jessica Davis, Senior Editor, Enterprise Apps,  12/30/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll