Tether
  • Product
    • Laptop and Device Tracking
    • RemoteKill®
    • Full Disk Encryption
    • Mobile Device Management
    • IT Asset Management
  • Pricing
  • Partners
  • Resources
    • Guides
    • Blog
    • Support
  • About
Login Free Trial
View all articles

2 Min Read

EXO5 is changing its name to Tether

19 May 2023

Share

  • Copy link

After 15 years of doing business as EXO5, we’re evolving our name and brand. As we embark upon our next phase of growth, we’ve adopted a name that addresses a wider audience and evokes a sense of intuitive communication and control.  That name is Tether.

In addition to the name change, we’re launching new products and services.  We recently soft-launched an MSP Console for our partners providing managed IT services.  In a few weeks, we’ll release new APIs enabling you to build connections between our services and your key IT infrastructure. In the second half of 2023 we’ll add anti-malware and anti-ransomware capabilities that further establish us as the one-and-done security console you trust.

We expect to complete the name change by 1 July 2023, but you can already visit us at tethersecurity.com.  You can access and bookmark the Admin Console at its new address, https://console.tethersecurity.com.  You’ll also have the option to auto-migrate your existing assets to the new URL, or you can leave your deployment unchanged, as we’ve designed our infrastructure to continue supporting the existing exo5.com addresses even after the changeover.

As Tether, we’ll continue our core mission of keeping our customers prepared for any security incident, and ready for any audit.  In the process, we’ll strive to make Tether a name you can continue to put your trust and confidence in.

 

  • Tether Features
    • Laptop and Device Tracking
    • RemoteKill®
    • Full Disk Encryption
    • Mobile Device Management
    • IT Asset Management
  • Pricing
  • Partners
  • Resources
    • Blog
    • Guides
    • Support
  • About
Laptop Tracking, Mobile Device Management, Endpoint Security, Anti-Theft Response and IT Asset Management

Today’s workforce is more mobile than ever, forcing businesses of all sizes to face new IT security challenges. IT now needs to deploy and support an exploding number of laptops and mobile devices. Ubiquitous network access means that more sensitive data resides on enterprise devices than ever before. Meanwhile, the consequences of losing sensitive data has grown into millions of dollars per incident and incalculable damage to an organization’s brand.

Protecting the enterprise from these challenges requires technology as well as getting back to basics. IT needs to have solid knowledge about their user and device base, including what devices are in circulation, who is using them, and where they are being used. Sensitive data residing on devices needs to be protected from unauthorized persons. Anti-theft countermeasures need to be available when assets are lost, stolen or compromised. Enterprises must be able to address these requirements in order to protect their customers, employees, intellectual property and brand.

  • © 2025 EXO5 LLC dba Tether Security
  • Privacy Policy