This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use,
see our Privacy Policy.
-
In Stock
- Virtual delivery
Add to Cart
Messages
Loading
-
:
Quick View
Getting Details
- Secure endpoints throughout their lifecycle
- Set alerts to be notified about possible threats
- Take action to quickly identify and remediate endpoint security incidents
Absolute Data & Device Security (DDS), formerly Computrace, helps you identify potential security threats and respond rapidly before they become damaging security incidents. We are all just one mistake away from a crisis. If a device goes missing today, organizations are exposed to fines, audits, penalties, civil and class-action lawsuits, and reputational damage. But if you can prove that the data on an endpoint was encrypted at the time of a security incident, or that data was securely deleted before it was accessed by an unauthorized user, a breach notification may not be required.
Absolute DDS provides a full complement of features and remote capabilities so that you can control and secure corporate data and devices, maintain the trust of your customers and stakeholders, and protect your organization from financial penalties and reputational damage. Absolute DDS also includes the support of the Absolute Investigations team. Our experts can recover stolen devices for forensic analysis, help you determine the cause of a breach, and provide guidance so you can refine endpoints security best practices.
Absolute DDS Professional Edition includes the following features:
-Reporting and Analytics: Collect incredibly accurate information from each device, including historical data. Determine what’s installed on a device. Identify events and activities that could be precursors to a security incident including changes to IP address, location, and user; non-compliant software/ hardware installations; and many more. Receive a notification if these activities occur.
-Risk Assessment: Identify risk conditions and receive a notification if these conditions occur. Key security data integrates automatically with SIEM solutions. Validate the status of complementary security applications such as encryption, anti-malware, and SCCM. Use these reports to prove to auditors that security measures were properly implemented and in place at the time of a security incident.
-Risk Response: Remotely recover or delete data. Set policies to ensure offline devices are automatically protected. Freeze a device and communicate with the user to verify status. Produce an audit log to prove data on a compromised device was properly secured, not accessed, and safely deleted. Use certified data delete workflows to decommission a device.
-Geotechnology: Track assets on a Google Map, including recent and historical locations. Create geofences based on corporate policies. Investigate devices that are out of bounds or entering an unauthorized location.
Absolute DDS provides a full complement of features and remote capabilities so that you can control and secure corporate data and devices, maintain the trust of your customers and stakeholders, and protect your organization from financial penalties and reputational damage. Absolute DDS also includes the support of the Absolute Investigations team. Our experts can recover stolen devices for forensic analysis, help you determine the cause of a breach, and provide guidance so you can refine endpoints security best practices.
Absolute DDS Professional Edition includes the following features:
-Reporting and Analytics: Collect incredibly accurate information from each device, including historical data. Determine what’s installed on a device. Identify events and activities that could be precursors to a security incident including changes to IP address, location, and user; non-compliant software/ hardware installations; and many more. Receive a notification if these activities occur.
-Risk Assessment: Identify risk conditions and receive a notification if these conditions occur. Key security data integrates automatically with SIEM solutions. Validate the status of complementary security applications such as encryption, anti-malware, and SCCM. Use these reports to prove to auditors that security measures were properly implemented and in place at the time of a security incident.
-Risk Response: Remotely recover or delete data. Set policies to ensure offline devices are automatically protected. Freeze a device and communicate with the user to verify status. Produce an audit log to prove data on a compromised device was properly secured, not accessed, and safely deleted. Use certified data delete workflows to decommission a device.
-Geotechnology: Track assets on a Google Map, including recent and historical locations. Create geofences based on corporate policies. Investigate devices that are out of bounds or entering an unauthorized location.
-
Term license
-
Software Subcategory: Security applications
-
Duration (Maintenance): 24monthsLicense Attributes: LicenseLicense Volume (#users): 1-2499
-
Due to manufacturer restrictions, all sales on this item are final.
-
0 lbs
-
OS Required: Android 2.3 or laterOS Required: Apple MacOS X 10.6 or laterOS Required: Microsoft Windows 10 (32/64 bits)OS Required: Microsoft Windows 7 (32/64 bits)OS Required: Microsoft Windows 8 (32/64 bits)OS Required: Microsoft Windows 8.1 (32/64 bits)OS Required: Microsoft Windows Server 2003OS Required: Microsoft Windows Server 2008OS Required: Microsoft Windows Vista (32/64 bits)OS Required: Windows 10 (32/64 bits)OS Required: Windows 8 (32/64 bits)OS Required: Windows 8.1 (32/64 bits)
-
43233205
Description | Availability | Unit Price | ||
---|---|---|---|---|
View All Warranties |
Batch Add Products by Item #
09