Exploration • Drilling • Field Services
Tese employees require access to commercially sensitive
information, so we need do everything we can to protect it when it is outside the security of our main offices.” Te company
“Computrace is now a key part of our data security measures because almost every time we’ve had a laptop stolen or mislaid, it allows us to prevent anyone from accessing the data. For a business like Tullow Oil, this capability is very important.”
Trudie Seeney, Information Systems Asset Manager, Tullow Oil
has a number of data protection measures in place, including data encryption, but it also wanted to put in place a means of securing and protecting devices especially when they are used abroad.
Solution
Te solution came via Tullow Oil’s hardware supplier, which is in partnership with Absolute Software. Embedded into the firmware of each of the laptops that Tullow Oil buys is Computrace by Absolute Software, an IT asset management, data protection and theft recovery solution. Tullow Oil simply needed to download the software to activate Computrace on all of its laptops. Te company managed the activation process by
rolling out Computrace to each main office location in stages, communicating and informing staff about Computrace before activating the endpoint security solution on their laptops.
should not be, the Computrace Agent sends an alert to Tullow Oil, providing them with the exact location of the device. Te team can then investigate and, if necessary, perform a data freeze or
even a data delete. Seeney says: “One of the reasons why we like Computrace is because it has really useful add-on features like geofencing.”
Results Since they started using Computrace, Tullow Oil has been able to protect important business data. “Computrace is now a key part of our data security measures because almost every time we’ve had a laptop stolen or mislaid, it allows us to prevent anyone from accessing the data. For a business like Tullow Oil, this capability is very important,” says Seeney. In one instance a laptop was stolen from a car in
Fig. 2. The Ugandan Buffalo- Giraffe site, now known as Jobi-Rii.
Tullow Oil is also planning to use the geofencing feature of Computrace. Around the world, and especially in Asia, the company has commercial partnerships with specific countries which can involve the sharing of sensitive information about oil reserves and exploration. It is important that this kind of information is protected and geofencing will ensure all company laptops stay within pre- defined countries and/or regions. With geofencing enabled, if a laptop moves into a location where it
38
www.engineerlive.com
Ghana. Almost immediately after the user reported the stolen laptop to headquarters in London, Seeney and her team were able to use Computrace to delete the data from the laptop. Te Computrace Agent on the laptop sent an alert to the Absolute Customer Centre which Seeney and her team can access. Via the Absolute Customer Centre from her office in London, Seeney was able to launch the Computrace data delete capability which instantly wiped the hard disk of the laptop in Ghana as soon as this device connected to the web. Computrace has also proved to be equally useful in less sinister situations. In situations when laptops have been mislaid, Computrace has been used to remotely lock the device rather than performing a data delete. Tis means that when the laptop has been found again it can be unlocked by an administrator. All the user’s data and settings are preserved and they avoid the trouble and delay required to get the laptop image re-built. Tullow Oil is now looking at how Computrace can be used to protect other mobile devices, such as like PDAs and mobile phones. “For Tullow Oil, saving money has not really been the main issue. It is the security of knowing that wherever our laptops might be in the world, we have a solution like Computrace to protect the data on them,” says Seeney. ●
For more information, visit
www.tullowoil.com
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78 |
Page 79 |
Page 80 |
Page 81 |
Page 82 |
Page 83 |
Page 84 |
Page 85 |
Page 86