Absolute® Software specialises in technology and services for the management and security of mobile computers and smartphones.
For individuals, Absolute provides peace-of-mind by physically recovering stolen computers and remotely deleting sensitive files from them. For businesses, we deliver state-of-the-art IT asset management – allowing enterprises to reduce IT costs, address regulatory compliance, combat computer theft and optimise the productivity of their mobile computer fleets.
Absolute’s security-as-a-service solutions protect millions of computers worldwide and our subscribers range from individuals to the largest public and private sector organisations.
The Computrace® Agent is a small software client that is embedded into the firmware of a computer at the factory. Through our strong relationships with computer manufacturers, most computers roll off the assembly line with our Agent already embedded. Or it can be easily installed with a simple download. Once activated, the Agent maintains daily contact with the Absolute Monitoring Centre.
Computrace provides the following capabilities:
Manage computers and smartphones (regardless if a device is on or off the company network). Monitor changes in asset information including user identification, physical location, and the installation of software/hardware that may not comply with company regulations.
Remotely delete sensitive data
Delete data on missing computers and produce an audit log of the deleted files to prove compliance with government and corporate regulations. Set alerts to be notified if noncompliance activities occur, including initiating a process to wipe a device clean if pre-set criteria is met.
Use GPS or Wi-Fi technology to track assets on a Google™ map. See current and historical locations within about 10m.
The Absolute Theft Recovery team will forensically mine a stolen computer over the internet using a variety of procedures including key captures, registry and file scanning, geolocation, and other investigative techniques to determine who has the computer and what they’re doing with it. Most importantly, we will use our technology to pinpoint the physical location of the computer and work closely with local law enforcement to recover it.
Fields marked * are compulsory