Overview
Unique Security Technology
CUCo is a unique security technology for computers, tablets and smartphones*, leveraging hardware, firmware and software agents to enable a device to self-compliance check, automatic or manual remote lock down, remotely unlock and locate, even before the operating system is running.
CUCo enables an intelligent protection of lost and stolen devices, intended to prevent unauthorized use of a computer, running on all sort of modern x86 devices*, from the lowest end tablet or smartphone, to the highest spec laptop, workstation or server. CUCo does not require traditional proprietary CPU or chipset security features.
Inclusive Projects Enabler
CUCo dramatically improves the odds of hardware recovery and contract compliance, allowing inclusive and non-discriminatory projects that would otherwise face economically insurmountable obstacles. It’s a truly unlock key to Device as a Service projects, as it solves the main obstacle of DaaS: the device control by the project owner while under a service contract.
Now, large projects on education, where inclusivity and non-discrimination are paramount priorities, are finally possible. Telecom operator x86 device handout when subscribing an Internet service, can finally happen at same time of the traditional smartphone handout on service subscription. Leasing companies can finally tap the vast SMB, SoHo and consumer market strongly limiting the default risk associated to the instalment payments.
Security Guarantee
This unique security technology has been verified and guaranteed against vulnerability attacks.
CUCo’s internal engine rules have thresholds timer intervals and action(s) to take, independently of device network connectivity status. CUCo provides local, tamper-resistant, policy-based protection that works even if the OS is reimaged or a new hard drive is installed.
(*)Currently developed for x86, but ARM based under development and expected available in Q1 2020. Given some technological limitations of the ARM architecture, not all security defences are implemented in ARM, as they are compared to x86 implementation.