Endpoint Lockdown
& Data Retrieval

Take Full Remote Control of Compromised Endpoints.
Includes remote lockdown, activity monitoring and geo-location

Remote Incidence Response Software

Files on a stolen or compromised computer are usually much more valuable than the machine itself. InterGuard lets you remotely access and lockdown lost, stolen or compromised PCs and Macs, then delete or retrieve any files or folders that you select. Additionally, real-time geolocation tracking offers tools to locate lost or stolen laptop.

How is InterGuard Different?

Works On and Off Network

Deployed at the endpoint, InterGuard works whether your employees are in the office or working remotely.

  • No network required
  • Ideal for today's mobile workforce


Get Full Remote Control over Compromised Endpoints, including:


How Does it Work?


Our Cloud or Yours

Our Cloud

Simply download licenses remotely over your network to work stations using our NetDeploy tool, which integrates with your Active Directory. Leverage our cloud infrastructure to make settings and view reports. No need to buy or setup any hardware.

Your Cloud

Want to host your own data? As long as you have SQL Server (Standard or Enterprise) and an existing Windows Server (2012, 2014, 2016 or 2017) then we will provide you with an installer that creates a database instance for InterGuard. No need to buy any additional hardware.



Full Compatibility

InterGuard is compatible with the following devices and operating systems (both 32 and 64 bit)



Windows 10
Windows 8 & 8.1
Windows 7


MacOS 10.7 - 10.14

*While we make every effort to upgrade to be compatible with new operating systems, InterGuard cannot guarantee compatibility with future operating systems.