Security Strategies


First: Define your risks.  What equipment would be expensive or inconvenient if lost or stolen?  What pieces are “mission-critical”?  What pieces are exposed in a public access area?  What contains confidential or sensitive information?  What would be hard for you to replace, either because of funding or special configurations?

Second: Come up with a plan that matches your organization’s environment and budget. Some of our clients require that every piece of new equipment they purchase be secured when it is first installed. Some order security devices when they order their equipment. Others arrange installation of security cables or pads when the equipment is in place.

Some corporate and institutional managers hold users and departments responsible for any losses (or their insurance deductible) if a physical security device is not used. One even provides a set of security instructions for protecting notebook computers along with every airline ticket issued by the corporate travel office.

The most effective strategies provide a comprehensive plan, incorporating (a) asset identification and inventory, (b) personal or departmental responsibility for assets, (c) a physical security device to protect the asset when it is in the office or on the road, and (d) data protection, access control and recovery software.

Desktop equipment strategies: Virtually every type of office and school equipment is vulnerable to theft. This review of the physical security strategies may be helpful.
Notebook and laptop computers: Portable equipment presents special challenges and requires special strategies. Here are a few ideas.
iPads, Tablets and eReaders: These new devices are ultra-portable and present special challenges to protect them.
Netbooks: Small, inexpensive and ultra portable, netbooks are still worth protecting.
AV Projection & Lab Equipment: Protecting AV and lab equipment, especially the newest digital projectors
Security Furniture: Workstations that protect PCs and flat panel monitors while providing a good instructional environment
Asset tagging: Theft deterrent asset tags can identify property and help you get it back.
Recovery systems: A kind of LoJak™ for laptop and desktop PCs


Our Security Solutions




Chromebook Carts

iPad Carts

Tablet Carts (w/universal hubs)

Network-Ready Managed Carts

Netbook Carts

Chart of Sizes


Notebook & Netbooks

Notebook Wall Safe


iPads and iPad minis

iPods and iPhones
Sync and Charge Strategies

iPad Security Enclosure

Apple TV

Other Apple Equipment

Security for Dell Equipment


Survey of Solutions

Security Cables

Pads and Enclosures

Recovery Systems

Asset Tags




Complete Charging Solutions

Dell Chargers

Lenovo Chargers


What's Hot | Security Strategies | Product Solutions | Industry Strategies
Home | About Us | Search | Datamation Systems - Technical Support

Datamation Systems, Inc.
Send general e-mail to Datamation Systems  with questions or comments about this web site. For technical issues please contact our Company Webmaster.
Copyright © 2015 Datamation Systems, Inc. - All rights reserved. 125 Louis Street, South Hackensack, NJ 07606-1733 - USA
Tel: 201-329-7200 Fax: 201-329-7272  -  Revised: Thursday, March 19, 2015