Finding the Right Lock
For over 20 years Tryten Technologies has offered a wide variety of highly effective computer security solutions. Our products are designed to meet unique needs in a variety of diverse environments, and therefore are available with a range of options and variations. There are a few key factors to consider when selecting a security product that will maximize the efficiency and effectiveness of your unique security solution. The following guidelines will provide a framework for securing your unique environment with the right product from Tryten. This first and most important factor to consider when selecting a security solution is the type of product or equipment requiring protection. Tryten’s website categories are organized according to the unique devices being secured. We have products that work specifically with Laptops, Mac Mini’s, Tablets, Tower computers and more. Consider the list of items you are securing before selecting the categories that relate. Secondly, it is important to establish the level of security required in each unique setting. There are two key criteria that will help determine this answer. Initially, consider the value of the device or equipment being secured. It must be noted that the value of various pieces of equipment may be more than the basic replacement cost. For example, although a laptop can be purchased for under $1000, the full value of the contents or information stored on the hard drive could be many times this amount. The costs for sourcing and setting up the new laptop, the cost of lost productivity, and possibly the cost of increased insurance premiums should all be considered. An additional factor to consider when establishing the level of security required is the degree of vulnerability for each item to either theft or damage. When looking at the susceptibility of computer equipment several details should be isolated. Firstly, consider how difficult or simple it would be to actually steal each device. For example, a large server weighing over fifty pounds is much more difficult to remove than a portable iPad. While the server would certainly be more valuable, it may be much less attractive to a potential thief. Secondly, establish the overall security level of the environment in which the equipment is located. A lobby area of a hotel is clearly a higher risk location than a locked office. Consider the amount and type of traffic and access in the area as well. A large office is likely to have many employees and persons associated with the company freely moving about. A medical clinic may see only slightly more traffic on a given day than the office, but is open to the public. A third factor in establishing your required level of security is the degree of mobility needed. Laptops or Tablets may need to be moved on a regular basis. In this scenario a Laptop or iPad Cable Lock might be the best solution. If an iPad is being placed relatively permanently in a library or store front as a resource to users, consider a mounted solution like the iPad Kiosk. Once the value, vulnerability and mobility requirements of your IT equipment have been assessed, determine the products required for your unique setting. Each product category on Tryten’s website allows for a variety of security levels. If securing a basic desktop computer in a private office, a standard level theft deterrent such as the Computer Lock T1 is possibly your ideal choice. If the item in question is a computer in a reception or lobby area, the Computer Lock T3 may be better suited to the increased risk level. Highly valuable or vulnerable computers may require a Computer Locker or Mac Mini Security Mount. If you would like assistance determining which solution is best for your situation, please call our sales department and they will assist in developing a security plan. Finally, once the appropriate security products have been selected, the final consideration is the keying option best suited for your needs. Tryten provides three standard keying options on nearly all security devices; namely, Keyed-Different, Keyed-Alike and Master-Keyed. Below is a chart to help determine which keying option is the best for your environment. Keyed Laptop Lock ONE UNIQUE SET OF KEYS FOR EACH LOCK Keyed Differently Example Use: Home, Student An excellent option for individual end users and situations that don’t require administration or a key recovery system. One unique set of two keys is assigned to each lock. Keyed Alike Laptop Lock ONE KEY OPENS ANY LOCK Keyed Alike Example Use: COMPUTER LAB, CALL CENTER All locks within a set are keyed the same, allowing any key to open all locks. Perfect for an environment such as a school or lab, or for any situation where the end user is not authorized to unlock equipment. The key is typically managed by an administrator. Master Keyed Laptop Lock Master Key Opens Any Lock UNIQUE SET OF KEYS FOR EACH END USER Master Keyed Example Use: Office with Mobile Work Force Ideal when both centralized management and end user flexibility are required, each lock is keyed differently from the other and comes with its own unique set of two keys. A Master Key capable of unlocking any of the locks is used by a designated administrator. If a user loses a key, an administrator can unlock the equipment with the Master Key. Altogether, when all of these options are considered an effective security solution is readily available from Tryten. If, however the solution you are looking for is hard to determine, please call a Tryten sales representative. At Tryten our specialty has always been finding security solutions for unique environments, even if that entails customization. A Tryten representative will determine if we carry the security device required, and if not will outline what is involved in customizing a solution. For more information on customization refer to our article entitled “Custom is Who We Are”.