LoJack Comes To Android Tablets - InformationWeek
Mobile // Mobile Devices
11:03 AM
Connect Directly
Ransomware: Latest Developments & How to Defend Against Them
Nov 01, 2017
Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly ar ...Read More>>

LoJack Comes To Android Tablets

Computrace adds persistent theft recovery features into Android firmware for Lenovo ThinkPad tablets.

Absolute Software, creators of the LoJack for Laptops anti-theft system, is now adding firmware-level anti-theft technology to a raft of new and upcoming Android devices. The first partner: Lenovo, courtesy of its new ThinkPad Tablet.

Yesterday, at an otherwise NDAed Lenovo industry event in New York City, Absolute Software's senior product manager Geoff Glave demonstrated and explained Computrace, their "persistence module" technology for Android (and other platforms as well).

A theft-recovery and device-tracking agent was embedded into the copy of Android running on the tablet. Devices not only can be physically located but remotely wiped, frozen, or have data selectively retrieved. The real advantage: the agent is also present in the device's recovery firmware. If a thief steals the device and reinstalls the OS or even swaps out the hard drive, the firmware will reinstall the tracking agent software so the device can still be recovered.

All-software solutions such as Prey suffer from the disadvantage of being, well, all software: a factory reset will remove the tracking application. Because Computrace is part of the firmware shipped with the device, it remains consistently present even after a factory reset. The software also provides IT managers with the means to comprehensively track, overview, and manage all devices in their fleet that have Computrace.

What about rooting the device, via a custom firmware such as Cyanogenmod? There, unfortunately, all bets are off: a rooted device could in theory have its firmware erased and replaced, and render Computrace ineffective. That said, Glave noted the ThinkPad tablet he was using for the demo had not yet been rooted, due to the DRM and other security measures in place (for NetFlix, among other things).

Device loss or theft aren't the only useful applications for Computrace. Another scenario is what Glave called "pre-loss" or "pre-theft": employees who deliberately walk out the door with their devices if they're fired, along with the data on it. Glave claimed they recover some 100 to 200 devices a week: "Better than 50% of them are internal thefts."

Not all such internal thefts are corporate malfeasance, either. Some of them involves scenarios where an employee lifts a device, "accidentally" loses it, wipes it, and then gives it to a relative.

Absolute Software has theft-recovery code in the firmware for many other name-brand PCs as well: Dell, HP, Acer, Fujitsu, Asus, Panasonic, and Samsung, among others. Lenovo was the first company it had partnered with to add its anti-theft code to Android tablets. Glave said the company would be announcing shortly a partnership with another major PC manufacturer that is adding Android-powered tablets to its lineup. Android phones, especially mid- to high-end models such as the Samsung Galaxy line, are another possible future target.

Home users who want to reap some of the same benefits, sans the firmware-level persistency, can use Lojack for Laptops on their Windows-powered devices. One year of protection starts at $29.99. The standard edition includes the ability to track, lock, erase, and recover a stolen device; the premium edition of the service includes a $1,000 guarantee that the device can be recovered or remotely erased if stolen.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
3/24/2014 | 1:51:32 PM
Re: LockItTight
well Appreciated this thought and the idea you have just given....
User Rank: Apprentice
3/24/2014 | 12:55:55 PM
Re: LockItTight
yes I would like to argue about it too because Lojack is way to expensive there are times when you dont need that much expensive applications in you Phone. However there are many other such as above mentioned LockItTight it is quite a simple and easy to use application.
User Rank: Apprentice
3/24/2014 | 12:48:55 PM
LockItTight is another better enhanced application it doesnt give you that much benefits but yes in many ways better than any other similar applications. its less intrusive and have better support than any other.
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll