Q
Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Asset tracking: What products and services can trace device location?

IT asset tracking can be used to ensure devices stay in a precise location, or to trace missing devices. Expert Michael Cobb covers the most popular products and services.

I'm looking for an app to trace assets when they're stolen or broken into. Can you suggest something of interest...

for asset tracking?

There are plenty of products and services available that provide asset tracking, depending on what type of assets you need to track and over what range. A variety of companies offer vehicle- or fleet-tracking services. Apptricity's Asset Tracking Software is a mobile or web-based asset tracking and management software tool that uses radio frequency identification tags to track asset movements within the workplace, or satellite and cellular networks to get precise location data for assets outside of the workplace.

If your main intention is to track IT assets, such as laptops, tablets and smartphones, there are a variety of options from which to choose. Geofencing is becoming a popular method for ensuring devices do not leave defined areas, like an office building. A geofence is a virtual perimeter around a given geographic area. When a device leaves a designated, geofenced area, an app installed on the device can trigger various actions, such as sending real-time notifications of the device's whereabouts, encrypting data on the device or disabling sensitive functions. For enterprises where hundreds or even thousands of geofences may be needed, it's important to use a platform that scales and has the ability to draw both polygonal and radial perimeters with no maximum size limit to ensure all situations can be handled.

Network-based geofencing using carrier-grade location data to determine where SMS-capable devices are located is a cheaper option, though less accurate. And as it requires pull requests to obtain location data, it isn't really practical for constant location-based asset tracking. In situations when a device should not leave a tightly defined area, such as a server room, a Bluetooth Low Energy hardware device or beacon can trigger an app to send an alert if the device is moved out of range.

Hardware vendors, like Dell and HP Inc., offer a range of laptop and data protection services, including asset tracking and recovery for lost or stolen laptops, with data delete features, so administrators can remotely delete sensitive data if a device is lost or stolen. Similar services are offered by zTrace Technologies -- if a device is stolen, it will report its location the next time it is connected to the internet. Prey Pro from Prey Inc. provides a set of management tools to track and trigger actions on any registered device. Once remotely triggered, devices can be locked down or send back location data, as well as a picture of who is using the device.

The Android Device Manager website and app can be used to find an Android device and lock or erase it, if needed. Typing "find my phone" into the main Google search page will locate the phone associated with the Google account being used, and will also ring it. Find My iPhone for iPhone and Find My Phone for Windows Phone apps provide similar services to find a missing iPhone or Windows device. To try and deter thieves from stealing mobile devices in the first place, consider using asset tags. They are cheap and not easily removed, and they are often enough to discourage the opportunist thief who is only interested in the device's resale value. Motion sensors can provide additional security for devices being used away from the office. MetaSensor Inc. is due to release a Bluetooth-based motion detector that can sound an alarm and send an alert if it is moved.

Ask the Expert: Want to ask Michael Cobb a question about application security? Submit your questions now via email. (All questions are anonymous.)

Next Steps

Read about the privacy concerns with location-based mobile management

Learn the steps to take for better mobile data protection

Find out what endpoint protection software IT pros are choosing

This was last published in October 2016

Dig Deeper on Network device security: Appliances, firewalls and switches

PRO+

Content

Find more PRO+ content and other member only offers, here.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

How does your company enforce keeping assets in a confined location?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

Close