case-study

How HyperX protect confidential data in case of lost or stolen devices

juanhernandez@preyhq.com
Juan H.
Sep 23, 2024
0 minute read
How HyperX protect confidential data in case of lost or stolen devices

HyperX LLC is an IT consulting firm based in downtown Chicago, serving a diverse range of small to medium-sized businesses. As a relatively small company themselves, they expertly manage over a thousand devices for their clients, ensuring robust IT support and security.

Jeremy Norton, a senior IT consultant at HyperX LLC, offered insights into the challenges and triumphs of their department. In our discussion, Jeremy shed light on the pivotal role that Prey has played in not only meeting their own security needs but also those of their clients, enhancing device management and data protection across the board.

Finding a way to protect confidential data in case of lost or stolen devices

HyperX LLC and its clients face the risk of data loss through lost or stolen devices, a major concern for finance and real estate firms. Securely handling this confidential data is crucial due to the potential repercussions of exposure.

"Our customers primarily operate in the financial and real estate sectors, where they handle a significant amount of sensitive data, particularly financial institutions with investor information. Hence, safeguarding this data is crucial. In the unfortunate event of a lost or stolen laptop, we must ensure we have in our ‘backpack’ the necessary tools to protect this sensitive data from unauthorized access.”

Seeking a Solution:

Prey's device tracking and data wipe features perfectly complement HyperX's security and management offerings for their customers.

HyperX LLC's commitment to maintaining a strong security posture led them to seek out enhanced protective measures for the devices they manage. The company identified a gap in its ability to track and control devices remotely, particularly in situations where a device might be lost or stolen. This realization highlighted the need for a specialized tool that could provide both location services and security functionalities.

"We've always prioritized our security posture, ensuring we have the necessary tools for various scenarios. When considering the risk of stolen phones or laptops, we realized we lacked effective measures for tracking or locking these devices. While we already had encryption and BitLocker in place, we needed a solution for device tracking and security. After exploring options, we had a positive experience with Prey during a demo with their salesperson. This led us to choose Prey as a valuable addition to our security toolkit.”

After evaluating various options, HyperX LLC chose Prey for its comprehensive approach to device security, which offers an efficient and non-invasive solution. This aligned perfectly with HyperX LLC's requirements.

Top Reasons Why HyperX LLC Chose Prey:

  • Security Focus: Prey was chosen primarily for its focus on device security, which was a major concern for HyperX LLC.
  • Positive Initial Experience: Their decision was influenced by a productive demonstration and effective communication with Prey’s sales team.
  • Comparison with Other Tools: Prey was chosen over other vendors in the market because it specializes in device security, instead of offering a wide range of "just adequate" features.
  • Complementary to Existing Security Measures: Prey complements their existing security measures like encryption, providing an additional layer of protection.
  • Non-Invasive Solution: Prey offered a non-invasive solution, ensuring security without compromising user privacy.
  • Affordable Pricing: Prey's pricing was particularly attractive, making it a feasible option for small to medium-sized businesses.

Benefits of Using Prey

HyperX LLC has greatly benefited from Prey's advanced device tracking options. The tool's ability to provide real-time location updates and detailed reporting on device status and activity has been invaluable. This functionality not only helps in the quick recovery of lost or stolen devices but also enhances the overall management and security oversight of the vast number of devices under their care.

"We utilize many of Prey's features, such as grouping and tagging devices. We manage these through the dashboard to enhance organization and have set up numerous custom reports for better information tracking. This ensures that we are aware of issues like outdated or improperly updated Prey Project agents. We also monitor the distribution of different software versions among clients and audit activities, all managed through the brand.”

In addition to tracking, Prey offers a range of features that further bolster device security. The custom wipe option is particularly noteworthy, allowing HyperX LLC to selectively erase sensitive data while retaining non-essential information if a device is compromised. The integration of Prey into their daily operations and offboarding processes also ensures that all devices remain secure throughout their lifecycle, preventing unauthorized access even after an employee departs the company.

Proven Effectiveness of Prey in Action

HyperX LLC's experience with Prey Project is epitomized by a remarkable incident where the software proved indispensable. When one of their client's laptops was stolen and subsequently marked as missing in Prey, the tool immediately began sending detailed reports about the device's activities. These reports included screenshots and location data, providing HyperX with the precise whereabouts and usage details of the laptop. This level of detailed monitoring allowed them to quickly assess the situation and take informed actions, demonstrating the critical importance of having such robust device security measures in place.

The resolution of this incident highlights the value of Prey in managing and securing devices. As it turned out, the supposed unauthorized user was the original owner, who had managed to repurchase the laptop from the thieves. Thanks to Prey, HyperX was prepared to contact law enforcement but chose to verify the situation with the user first, avoiding potential complications.

"It was satisfying to have our first complete experience with Prey, from start to finish. We utilized all of its features, including initiating a screen lock and wiping all data from the machine as soon as we detected it being used again. We instantly activated the kill switch, maximizing Prey Project's capabilities in that particular scenario.”

This incident not only highlighted Prey's comprehensive security features, such as the ability to lock the screen and initiate a data wipe remotely but also showcased the practical benefits of integrating such a tool into the company’s security strategy. This experience reinforced HyperX LLC's confidence in Prey, validating its effectiveness in real-world scenarios and confirming its essential role in its security toolkit.

Jeremy sums up the sentiment perfectly, "Prey instills a sense of comfort in users, knowing that their devices are protected in case of loss or theft. This assurance reduces concerns about potential consequences and data exposure, as we have the tools in place to mitigate risks like with the Custom Wipe feature.”

Discover

Prey's Powerful Features

Protect your devices with Prey's comprehensive security suite.