If computer is reported lost/stolen, a location beaconing starts and an IP address log is created for forensic usage and device recovery
Multiple self-healing defences were created, using the most advanced cryptography methods, to secure the CUCo mechanism against hacking attacks. CUCo technology is not intended to protect data residing on hard disks, only the hardware itself by temporarily “bricking” it.