STOPMonitor & STOPMonitor Pro
Manage, Track, and Safeguard Your Device and Data
STOPMonitor is the lowest cost, easiest to implement, and most versatile Asset Tracking System available, providing Real-Time Asset Tracking, Geolocation and Data Protection.
All STOP Security Plates come with STOPMonitor Standard. To get the full benefits of theft protection, upgrade to STOPMonitor Pro.
Real-Time Asset Management
Track computers in real-time. Know where they are, what’s on them—who’s using them. React to what is happening NOW, not to what happened yesterday
Real-time Asset Management provides administrators the ability to see across the organization to understand and control constantly changing situations.
STOPMonitor Standard/Pro provides administrators simple, real-time, asset management. Incorporating the same robust communications architecture used by Google talk and the Apple iCall server, it seamlessly connects to every mobile computer asset in the organization. Reacting to a day-old snapshot is a thing of the past with real-time reporting. An indispensable aid to productivity and to an administrator’s due diligence, STOPMonitor Pro provides them power to instantly deliver the information CEOs expect them to know.
Simple to install, or available as a pre-installed option by contacting STOP, STOPMonitor Standard/Pro works in the background to collect and report both hardware and software configuration information. STOPMonitor Standard/Pro additionally reports what machines are connected online as well as who is using them and where they are in Real Time. Real-time access means that instead of taking action on information from earlier in the day or even yesterday, administrators can use STOPMonitor Pro integrated data protection tools to react immediately to maintain control over compromised equipment or intellectual property, the moment a threat is perceived.
(You need a minimum of 25 Security Plates to qualify for the free STOPMonitor standard)

Enterprise Console
A web-based information console for true administration control and detailed understanding of technology assets, from hardware to software.
The central station for overseeing organizational assets, the Enterprise Console, provides administrators direct control over every protected device.
The central information view and functionality provided by the Enterprise Console is an unparalleled aid to administrators. Accessible from any web-connected location, it displays every important information element for managed computers collectively and individually. Asset management data such as user name, device name, hardware configuration, serial number, description, IP address, software, operating system version, current network connection status, and most recent connect time are all collected and granularly reported. Clear, and easy to use, STOPMonitor Standard/Pro allows administrators to see at-a-glance the full complement of computers under their supervision and to quickly filter the results to identify and target any group or single device.
With the ability to manage up to 2.5 million devices, STOPMonitor Standard/Pro is capable of serving as the central asset control center for any sized organization.
Administrators can tailor their computer security using multiple approaches to provide enterprise level protection for both hardware and data. By accessing the web-based console from any desk, STOPMonitor Pro administrators can precisely geolocate missing machines, target them and with a simple toggle, reversibly encrypt data the moment a threat is identified or even suspected. For constant, active defense, devices can be pre-set to lock down (via the Bootlock function), with files becoming reversibly encrypted if the device does not connect within a pre-determined number of days.
When STOPMonitor Pro administrators are satisfied that the asset is safely returned or in authorized hands, they can simply return to the Enterprise Console and via password disable bootlocks or decrypt protected files.
(You need a minimum of 25 Security Plates to qualify for the free STOPMonitor standard)

Geolocation
Geolocation via IP Address
> STOPMonitor Standard enables geolocation of registered assets via Public IP Address. This approach enables STOPMonitor administrators logged into the secure Web-based console to determine
the Public IP Address of the Internet Service Provider server through which the asset is accessing the Internet. While this Standard feature can be helpful in providing general location info, STOPMonitor Pro provides more precise geolocation to within 50 feet via Wi-Fi triangulation. See more on the Pro version below.
(You need a of 25 Security Plates to qualify for the free STOPMonitor standard)

Enhanced Geolocation Wifi + IP Address
Tracking accuracy is significantly improved over single input tracking by collecting from each monitored mobile device a combination of the raw data from GPS satellites, Wi-Fi triangulation, cell tower positioning information, and the location data extracted from public IP databases. Through a patented algorithm that combines the output
of all of these data sources, the information is analyzed and transmitted to a leading location server then, in the event that additional detail is needed, is sent back to a dedicated location server. The best available location confidence is reported and managed devices can be tracked with precision to within 100 feet of their location on a detailed map display.
(STOPMonitor Pro comes with a free STOP Security Plate - Minimum Order 10)



Reversible Encryption
Instantly and remotely activated reversible encryption defends against data leaks by encoding files to make them unreadable until returned to your control.
Administrators can proactively act to defend critical information on a missing device without delay or concern of causing data loss.
STOPMonitor Pro does not defend data with an “all or nothing” or “just erase it” approach. From the Enterprise Console, administrators can set machines to encrypt their data at the directory or file or directory level. Using military grade file encryption following the Advanced Encryption Standard (AES 128), mobile device data is protected from access by unauthorized users or thieves, but the encryption remains fully reversible should a missing device be recovered. Once a computer is confirmed as in legitimate hands, administrators can remotely reverse the file encryption and reunite users with their data.
Because STOPMonitor Pro protects data through non-destructive reversible encryption, administrators are free to take strong action the moment a threat is perceived without concern that a “bad call” might result in lost data. The administrator receives immediate confirmation from the device when the selected files or folders have been successfully encrypted.
STOPMonitor Pro encryption secures data directly without reliance on the operating system. This approach means that even if the drive is removed from a machine and placed in a different device, its data remains encrypted and safe.
(STOPMonitor Pro comes with a free STOP Security Plate - Minimum Order 10)

Bootlock & Offline Bootlock
Ensure the wrong people can’t get in. Equip machines with the continuous data protection tools needed to defend themselves.
Total data security brings peace of mind. With Bootlock, mobile devices can be fully disabled so unauthorized persons can’t start or use them.
STOPMonitor Bootlock is designed to provide the ultimate security. From the Enterprise Console, administrators can remotely, instantly reboot and lock out connected devices, effectively rendering them unstartable. Loading before the operating system, Bootlock makes it virtually impossible to circumvent protection. To pass the block, a password that is generated from the Enterprise Console must be entered on the target machine and verified by STOPMonitor. As a further level of security, the password is generated at the point of reactivation by the administrator, eliminating the possibility that a preexisting password has been compromised.
The Bootlock can be preset to take effect automatically if a device has not connected and checked in before a predetermined “offline curfew” number of days. With no need for a missing machine to establish a live connection, the lockdown procedure can be set to activate at the next reboot and then lock out the device eliminating any continued unauthorized use of the device. A customized, “Bootlock” message informs thieves (or no longer authorized users) that the machine has been locked until an administrator authorizes access by providing a new access password generated from the administration console.
For the administrator, removal of an active Bootlock is as simple as targeting the recovered machine and clicking the “unlock” button. Simple for the administrator, impossible for unauthorized users.
(STOPMonitor Pro comes with a free STOP Security Plate - Minimum Order 10)

STOP Product Comparison Additional info
STOPMonitor Pro
STOPMonitor (Standard)
STOP Security Plate
STOPLock
STOP Security Plate STOPMonitor Pro
Real-Time Asset Management
Enterprise Console
Geolocation Via IP Address
Enhanced Geolocation Wifi + IP Address
Reversible Encryption
Bootlock
Offline Bootlock
Visual Theft Deterrence
Lost Equipment Recovery
No Illegitimate Resale Value
Heavy-Duty Anchoring
Cable Lock Down
Which version is right for me?
Not sure whether to choose STOPMonitor or STOPMonitor Pro? Ask the experts. 1-800-488-STOP or contact us.
Explore More

