Is the horse out of the barn already? IOW, is this a case of trying to recovery an already lost/stolen laptop, or just a preventive measure you're considering before it happens? Because if it’s the latter, there is Lojack
. If it’s the former, well…, that gets a lot more complicated.