ZTRACE Technologies is a premier provider of innovative security software and services designed to meet the challenging data security and asset protection demands of today's mobile computing environment.EnglishGermanFrenchUnited KingdomIrelandBelgiumLuxembourg Tell a friend about zTraceRegistration and Download!zTrace privacy policy
zTrace Technologies provides a comprehensive set of software components that aids in the recovery of stolen or missing computers and laptops, protects sensitive data in case of unauthorized access and effectively monitors hardware and software assets for tracking. What if YOUR laptop gets stolen?If your laptop is missing, our invisible security software will monitor your laptop and trace it location for recovery.

ProductsGet It Now!NewsQuestion DeskzLabMedia RoomzTrace CorporateContact Us
zTrace GoldzTrace Gold
  Login Name 

Enterprise Quote
Request Form
Purchase Individual
Download Product
Information Sheet

Flash Clip
Flash Clip
zTrace Gold
What Is It?

ZTRACE GOLD is an invisible software security application that traces the location of missing laptops for recovery.

ZTRACE GOLD is undetectable and unerasable on a laptop's hard drive. The computer completes a handshake with the ZSERVER at every Internet connection. If the laptop is reported missing, a patent pending process occurs for the ZTRACE Recovery Team to identify the computer's exact physical location. The ZTRACE Recovery Team coordinates with local law enforcement for a completely outsourced recovery solution; the entire tracing and monitoring service resides with ZTRACE. For enterprises, ZTRACE GOLD provides a flexible solution that can be managed internally by an organization's own internal security department or outsourced with the ZTRACE Recovery Team.

zTrace Gold is an invisible PC software security application that monitors and traces the location of missing laptop for recovery. By using zTrace Gold you'll keep your computer theft protected!

Why Do You Need It?

What if your laptop gets stolen or just turns up missing? The possible scenarios are endless. Imagine coming back from lunch one day and your laptop has simply vanished. Must be an inside job since your office is secure. Even with the increased security at airports, there's still the significant risk someone grabs your computer case instead of his own. Can you really trust the cleaning staff in the hotel or your fellow conference attendees? Have you ever left something in a taxi and tried to get it back?

Any chance you'll ever see your laptop again? Even if you file a police report, how will the physical location of your mobile notebook computer be determined? Up until now, there has been no viable solution. The FBI states than less than 2% of laptops are ever recovered. Over 300,000 laptops were reported stolen last year. Do you want to be one of those statistics?

ZTRACE Technologies recognized the downsides of the wonderful world of mobile computing -- mobility and portability. This all started because ZTRACE’s founder found his home burglarized and the thief didn't steal the laptop. That started the "what ifs" that led to the development of ZTRACE GOLD.

How Does It Work?

ZTRACE GOLD is installed on the laptop's hard drive and registered with the ZSERVER with a unique identification. Every time the laptop is connected to the Internet, ZTRACE GOLD checks with the ZSERVER to determine the laptop's status. ZTRACE GOLD operates in stealth mode, with no directories, files, icons, or sounds ever appearing on the laptop.

In the event of theft, the owner notifies the ZTRACE Monitoring Center via phone, e-mail, fax, or the Web. The ZSERVER tracking system is activated and waits for the next connection of that laptop to the Internet.

ZTRACE GOLD works with any type of Internet connection, including dial-up, cable modem, DSL, T1 and wireless. It recognizes and traces through both internal and external networks for LAN/WAN configurations to pinpoint actual location of the missing laptop. ZTRACE GOLD supports intelligent telephone dialing capabilities to trace the location through any public or private phone system, including dial-out prefixes, international calls, and can even capture blocked or unlisted calls through caller ID.

When the missing computer connects to the Internet, the stealth application receives a signal from the zSERVER and the computer reports its own location.

ProductsGet It Now!NewsQuestion DeskzLabMedia RoomzTrace Corporate
Copyright © 1999-2004 zTrace Technologies. All rights reserved. Terms of Use. Privacy Policy.