Protect mobile devices and keep data safely secured.
Tablets and smartphones are vulnerable to threats such as theft and loss. Therefore, the ability to remotely lock a stolen or lost device is essential and a common requirement in many projects today.
The Geo Track & Lock anti theft system from Radix enables easy tracking and effective protection should your tablet or smartphone fall into the wrong hands. With the Geo Track & Lock every device remains fully protected even following factory reset.

Key features overview
- Cloud based hosted system server, supporting up to 200K nodes per server
- Round-the-clock redundancy server replica available, offering the same seamless redundancy capabilities in case of server failure
- Remote command – device locking and unlocking
- Encrypted communication between device and server
- Device information and system administration
- Device tracking by GPS, cell data or Wi-Fi
- Remote command – wipe device data (optional)
Unlocked tablet
GeoLock operation does not rely on a user interface. This ensures the application cannot be disabled or removed by a user, but instead securely communicates directly with the GeoLock server. Once a command is given from the server console, the tablet will immediately be locked (when next connecting to the Internet).
Locked tablet
Once locked the tablet cannot be used. Even performing factory reset will not remove the GeoLock installation. As long as the tablet’s status on the server remains “locked”, it has no operability and is effectively useless to the person holding it. Unlocking the tablet can be performed remotely from the console or with a secured access code by the administrator
Cloud console screen
The cloud interface console allows full management of the system – features include:
- Remotely locking and unlocking tablets
- Complete information on every tablet
- Searching interface
- Location positioning based on WiFi, cell data, or GPS (when available)
- IP location information database access
SaaS delivery, cloud managment
Wipe or Lock device for data security
Integrates in device firmware
Hierarchical user management policy