In another city, a CEO arrives at the airport, headed for a big meeting with a potential partner. He sets his laptop bag and his overnight bag down beside his chair, and walks over to the coffee stand not more than 15 feet away. When he gets back to his seat four minutes later, he discovers that while he was getting a cappuccino, someone else was making off with his laptop... and all the financial and marketing information that's on it.
Think these are lost causes?
Think again, says Dave Johnson, director of infrastructure technology at Grant Thornton, LLP, one of the nation's top five accounting firms. If either of these two fictional people worked for Grant Thornton, Johnson says he would have an excellent shot at getting those stolen laptops back.
Johnson basically has his company's 4,400 laptops and 400 desktops hooked up with a sort of LoJack system. If any of them is stolen, he'll be able to trace it as soon as someone uses it to log onto the Internet.
''You've got to realize that 85 percent of my professional staff travel frequently. We are the most mobile workforce that I've ever worked for,'' says Johnson, who has to deal with 585 offices in 110 countries around the world for a company that brought in $728 million in revenue for fiscal 2005. ''You just can't eliminate theft but you can minimize the impact. And that's really what we've done with Absolute.''
Grant Thornton has had Absolute Software, Inc.'s Computrace program on every one of its laptops for the last four or five years. Computrace is designed as a theft recovery solution and it comes installed on every laptop that Grant Thornton leases from Dell.
The software, which runs silently in the background, reports in to Absolute, registering that it's running, who logged in on it and the IP address that it's using. It checks in on a pre-set schedule. Johnson says that means that at any given time, he can go to Absolute's Web site and check the status of any of his company's laptops -- the last time it reported it, who was using it and where it was.
However, if Johnson calls Absolute and tells them a notebook has been stolen, Absolute will change the computer's reporting schedule, forcing it to report in every 15 minutes. Since the software runs silently, the thief doesn't realize that every time he goes online with the stolen machine, it's helping Absolute track his location.
''Companies are getting out of leasing because they have to write the checks at the end of the lease for what they can't find,'' says Johnson. ''To fix the problem, they get out of leasing. It's avoiding the problem. All they're saying is, 'Five years from now who's going to care about this old notebook?' But it doesn't 'go away' five years from now. It's stolen maybe nine months after you've bought it. That's hiding the problem as opposed to dealing with it.''
Johnson says they have used Computrace on several occasions to not only locate stolen computers but to apprehend the thieves, as well.
To Catch a Thief
He says Computrace came in particularly handy once when the IT department had hired a contractor from a temp agency to fill in for a worker who was on leave during a time when old laptops were being swapped out for new ones. This refresh was happening in the office where the temp was working.
''About two weeks into it, the worker notified the agency that he had a family medical emergency that would prevent him from working for Grant Thornton and the agency any more,'' says Johnson. ''We thought this was odd and took inventory and found seven notebooks missing. They were bran' spanking new. Right out of the show room. They had been part of a big shipment. Each one was worth a minimum of $1,500.''
Johnson says he contacted Absolute and gave them the serial numbers of the seven missing laptops. Absolute workers started to watch for those machines to start checking in... and they did.
The first stolen computer started reporting in from a home in Virginia. Absolute's people worked with the Virginia police who went to the home, confiscated the computer and convinced the 'owner' to finger the person who sold it to them. Then the second computer reports in. The police recover it and the same person -- the temp worker -- is finger for selling it.
The police arrive at the man's house, where they find two of the other stolen notebooks. All of the others eventually were recovered as well.
Johnson says the temp worker turned thief received a 10-year sentence with a minimum of two behind bars. ''A bad guy went to jail and Grant Thornton got its product back,'' says Johnson. ''The notebooks were fine. We wiped them, reinstalled them and put them back in the field.
''When you think about the benefits... We were able to track our products and get them back,'' he adds. ''But more importantly, we sent a message to anyone who hears about this. You don't want to steal Grant Thornton property. You will go to jail. They will prosecute. It's just not a smart thing to do.''
Johnson says using Computrace directly ties into the company's asset management program.
''We feel very strongly about managing and maintaining the whereabouts of our assets,'' he adds. ''These machines are 100 percent leased, so at the end of the lease, I have to produce all of this equipment and present it to Dell in a timely matter. When you can't return leased assets, it costs hundreds and hundreds of dollars to buyout equipment you can't find.''
Gartner, an industry analyst firm, theorizes that an 8 percent to 10 percent loss rate on leased equipment is considered good asset management. Johnson reports that Grant Thornton's loss rate is 1 percent.
Ken van Wyk, principal consultant for KRvW Associates, LLC and a columnist for eSecurityPlanet, says theft recovery software has been around for some time now. But the fact that Computrace runs silently is a benefit.
''It's not necessarily a bad thing if it's very stealthy in what it dos and a thief doesn't know it's running,'' says van Wyk, who had two laptops stolen out of his car once. ''But if I were a thief and I had stolen a laptop from someone, I'd load a different operating system onto it. I wouldn't try to run any software that the person had on that machine.''
Regardless of how smart most criminals are, van Wyk says he's impressed with Grant Thornton's 1 percent loss rate.
And without the tracking software, Johnson says it would be difficult at best to maintain that kind of rate.
''Without an auditing tool, what do you believe?'' he asks. ''When Mary Smith says, 'I never had that notebook. I traded it in for a new one and I don't know what your people did with it.' Now I have a record of every time that machine has reported in and who reported in on it. Now I know who to believe.''
One of the ways around the issues of security and control that make some businesses wary of cloud computing is to build a private cloud -- one that remains within the corporate firewall and is wholly controlled internally. Private clouds also increase the agility of IT an organization's IT infrastructure and make it easier to roll out new technology projects. Download this eBook to get the facts behind the private cloud and learn how your organization can get started.