banner
banner

Absolute

Absolute provides persistent endpoint security and data risk management solutions for computers, tablets, and smartphones.

Absolute Data & Device Security (DDS), formerly Computrace®, is an adaptive endpoint security solution. It provides a persistent connection to all of your endpoints and the data they contain which means you’re always in control, even if a device is off the network or in the hands of an unauthorised user. The ability to communicate with your endpoints – regardless of user or location – means you can receive timely device and event information. Most importantly, you can apply remote security measures to protect each device and the data it contains. No other technology can do this.

With patented Persistence® technology, you can consistently assess risk, secure the lifecycle of each device, and pre-emptively respond to security incidents. Not every security incident is a disaster but until you can determine the nature of an event, you need a dependable, non-invasive way to monitor and protect your organisation. Persistence® technology by Absolute provides you with a two-way connection to each device so you can receive alerts, assess scenarios, and apply an appropriate response. This adaptive security model provides you with coverage for the most hostile (and mundane) events.

Persistence® Technology

Absolute Persistence technology is built into the firmware of over half a billion devices worldwide. Once the software agent is installed, Persistence® is activated and the agent transmits device information to IT so they can remotely track, manage, repair and secure devices. Even if the firmware is flashed, the device re-imaged or the hard drive replaced, the agent will simply reinstall.

Share This ArticleTweet about this on TwitterShare on FacebookShare on Google+Share on LinkedInEmail this to someone

Address:

 

Phone:

0118 902 2048

 

Website:

https://www.absolute.com/en

image

Cyber Interference – the Changing the Face of Elections

Thursday, 25 May, 2017 In Other News, Top News

Influential Organizations and Individuals or Those With Ties to Government or Political Institutions May be Targets for Cyber Attacks  Last…

What is XData? New ransomware spreading faster than WannaCry sparks concerns

Thursday, 25 May, 2017 In Other News, Top News

A new ransomware threat is brewing in Ukraine, which security experts expect could likely lead to even more widespread attacks…

Getting Serious About Teen Smartphone Addiction | Smartphones

Wednesday, 24 May, 2017 In General News, Other News

Parents don’t need a poll to tell them their teenagers are addicted to smartphones. After all, smartphones are a permanent…

The Administrative Credentials Security Hole

Wednesday, 24 May, 2017 In Featured News, General News

Here’s the problem: the existence of administrative credentials stored on machines throughout the network. What could happen if some of…

With a year to GDPR coming into force, what do businesses need to do?

Monday, 22 May, 2017 In Featured News, GDPR Strategies

With 25th May 2017 marking a year until General Data Protection Regulation (GDPR) comes into force, Mark Thompson, global privacy…

image
Latest Videos
Polls
Sorry no Polls available - check back soon