Device CUCo Rules vs Noncompliance


Device rules detect noncompliance use, theft/lost report, timer expiry or hacking attempt and automatically execute a device lock down

End user is given a “lock down” message (customizable), a unique event code and usually a call back number to seek assistance to unlock his device

Defences vs Hacking Attacks

If computer is reported lost/stolen, a location beaconing starts and an IP address log is created for forensic usage and device recovery

Multiple self-healing defences were created, using the most advanced cryptography methods, to secure the CUCo mechanism against hacking attacks. CUCo technology is not intended to protect data residing on hard disks, only the hardware itself by temporarily “bricking” it.