Absolute

Absolute provides persistent endpoint security and data risk management solutions for computers, tablets, and smartphones.

Absolute Data & Device Security (DDS), formerly Computrace®, is an adaptive endpoint security solution. It provides a persistent connection to all of your endpoints and the data they contain which means you’re always in control, even if a device is off the network or in the hands of an unauthorised user. The ability to communicate with your endpoints – regardless of user or location – means you can receive timely device and event information. Most importantly, you can apply remote security measures to protect each device and the data it contains. No other technology can do this.

With patented Persistence® technology, you can consistently assess risk, secure the lifecycle of each device, and pre-emptively respond to security incidents. Not every security incident is a disaster but until you can determine the nature of an event, you need a dependable, non-invasive way to monitor and protect your organisation. Persistence® technology by Absolute provides you with a two-way connection to each device so you can receive alerts, assess scenarios, and apply an appropriate response. This adaptive security model provides you with coverage for the most hostile (and mundane) events.

Persistence® Technology

Absolute Persistence technology is built into the firmware of over half a billion devices worldwide. Once the software agent is installed, Persistence® is activated and the agent transmits device information to IT so they can remotely track, manage, repair and secure devices. Even if the firmware is flashed, the device re-imaged or the hard drive replaced, the agent will simply reinstall.

Share This ArticleTweet about this on TwitterShare on FacebookShare on Google+Share on LinkedInEmail this to someone

Address:

 

Phone:

0118 902 2048

 

Website:

https://www.absolute.com/en

image

Most Profiles Likely Scraped by Third Parties

Friday, 6 April, 2018 In Featured News, General News

Facebook announces plans to restrict data access after 87 million users’ data was improperly shared with Cambridge Analytica. Data belonging…

How to Build a Cybersecurity Incident Response Plan

Friday, 6 April, 2018 In General News, Other News

Being hit by a cyberattack is going to be painful. But it can be less painful if you’re prepared, and…

Combating seven common threat techniques in 2018

Friday, 6 April, 2018 In Editorial, General News

By Keiron Shepherd, Senior Security Specialist, F5 Networks  With automated tools and hackers for hire, cybercrime has turned into a…

780 Days in the Life of a Computer Worm

Wednesday, 28 March, 2018 In Featured News, General News

This is a story of a worm, from the time it was coded and deployed onto the Internet. It is…

Getting Ahead of Internet of Things Security in the …

Wednesday, 28 March, 2018 In Editorial, Featured News, General News

In anticipation of an IoT-centric future, CISOs must be rigorous in shoring up defenses that provide real-time insights across all…

image
Latest Videos
Polls
Sorry no Polls available - check back soon