Desktop Security Strategies


Security Strategies for Securing Desktop Computers

When you are protecting desktop computers, printers, fax machines, digital projectors, or laboratory or AV equipment, the type of security you should use depends on a number of factors.  Exposure, risk and budget are the three most important.

  Exposure: Is your equipment in a public access area or high crime area? Have you or your neighbors had theft problems before? Even if you have guards, alarm systems or locks on the door, you are still exposed. Most theft is done by people authorized to be on your premises.
  Risk:  What would happen to you or your operation if a particular piece of equipment is stolen? Would you miss important faxes? Would you be prevented from printing key documents? Would you lose valuable or sensitive information? Would instructional programs or customer service be disrupted?  Would the inconvenience and disruption of reconstructing your configuration effect your operation?  See How to measure the real cost of stolen equipment: a management report.
  Budget: What resources do you have? Anti-theft devices range from simple cables (inexpensive, low level theft deterrents) to the steel pads and enclosures used in New York City's toughest schools...with choices in between.


Datamation Systems can help you develop a sensible strategy for your organization,

using the most comprehensive range of equipment security options anywhere


  Security Enclosures: a variety of custom-sized Compu-Gard steel enclosures that encase a CPU, and protect a computer monitor, accessories and internal components.
  Security Pads: interlocking steel plates attach to some PCs, printers, fax machines, TVs, VCRs and other equipment and anchor them to a desk.
  Maximum strength security cable systems: different lengths of 1/4" steel aircraft cable, coated in vinyl, can secure multiple pieces of equipment; comes with all fastening hardware and padlock (much stronger that common stationery or computer supply locks).
  Theft Deterrent Asset Tags
  Recovery Systems: a kind of LoJakô for PCs.


Our Security Solutions




Chromebook Carts

iPad Carts

Tablet Carts (w/universal hubs)

Network-Ready Managed Carts

Netbook Carts

Chart of Sizes


Notebook & Netbooks

Notebook Wall Safe


iPads and iPad minis

iPods and iPhones
Sync and Charge Strategies

iPad Security Enclosure

Apple TV

Other Apple Equipment

Security for Dell Equipment


Survey of Solutions

Security Cables

Pads and Enclosures

Recovery Systems

Asset Tags




Complete Charging Solutions

Dell Chargers

Lenovo Chargers


What's Hot | Security Strategies | Product Solutions | Industry Strategies
Home | About Us | Search | Datamation Systems - Technical Support

Datamation Systems, Inc.
Send general e-mail to Datamation Systems  with questions or comments about this web site. For technical issues please contact our Company Webmaster.
Copyright © 2015 Datamation Systems, Inc. - All rights reserved. 125 Louis Street, South Hackensack, NJ 07606-1733 - USA
Tel: 201-329-7200 Fax: 201-329-7272  -  Revised: Thursday, March 19, 2015