Page 2

By Ryan Naraine  |  Posted 2004-12-02 Print this article Print

What if the dongle is removed? "It is automatically detected by the base station and reported immediately. Decryption of the data is done through the dongle, so no dongle means no use of critical data," Wozniak explained.

Using device-location history, a cookie-crumb trail will help with retrieval of the stolen or lost laptop, he said.

In highly sensitive environments, the application can be integrated with audio alerts and sensors to trigger early warnings, said Wozniak, who is president and chief technology officer of the Los Gatos, Calif.-based Wheels of Zeus.

For insights on security coverage around the Web, check out Security Center Editor Larry Seltzers Weblog. "The biggest benefit of this is very simplified usage," he said. "The company defines where the computer can or cant be used. You set up the PC to operate in one location, but not others, and you can also approve operation in multiple environments, all based on GPS tracking."

Throughout the entire process, Wozniak said the encryption key is controlled in a central location through a secure transmission. Because the wOz Platform and the wOzNet network are proprietary, he said it is not open to Wi-Fi spoofing or password sniffing.

For companies with mobile work forces that move from location to location with laptops, he said the application may require multiple base stations.

Wozniak did not provide details on pricing for the application or a timeline for release. Company officials could not be reached to discuss commercial rollout.

Wheels of Zeus already has a deal with Motorola Inc. to develop devices and services for location-based monitoring of pets and other important possessions, but not much is known about the types of devices being created.

Check out eWEEK.coms for the latest security news, reviews and analysis.


Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel