Device CUCo Rules vs Noncompliance
Device rules detect noncompliance use, theft/lost report, timer expiry or hacking attempt and automatically execute a device lock down
End user is given a “lock down” message (customizable), a unique event code and usually a call back number to seek assistance to unlock his device
Defences vs Hacking Attacks
If computer is reported lost/stolen, a location beaconing starts and an IP address log is created for forensic usage and device recovery
Multiple self-healing defences were created, using the most advanced cryptography methods, to secure the CUCo mechanism against hacking attacks. CUCo technology is not intended to protect data residing on hard disks, only the hardware itself by temporarily “bricking” it.