Absolute Software CTC-GD-60 Leaflet

Page of 2
 www.absolute.com
Computrace Products
FOR ENDPOINT SEcuRITy
Manage
Monitor and manage all of your IT assets within 
the Absolute Customer Center (regardless if a 
device is on or off your network).
Protect
In the event of loss or theft, remotely delete all 
sensitive information and generate reports to 
prove your compliance with government and 
corporate regulations.
Recover
Report a theft and engage the Absolute Theft 
Recovery Team who will work with local law 
enforcement to recover your property.
Guaranteed!
Receive up to $1000, if we are unable to recover 
your computer.
Asset 
Administration
Data & Device
Security
Theft 
Recovery
Geotechnology
Service 
Guarantee
“Track and 
  Secure Me.”
Customer view of IT assets within Absolute Customer Center, with geofencing enabled.
Business moves quickly and so do your people. In today’s world of technology, data can be 
accessed and shared 24 hours a day from just about any location. So how well can you account for 
your corporate IT assets? And what about the data they hold? Failure to monitor and control this 
part of your business can lead to data breach penalties – and even worse, the type of negative 
publicity that can take years to repair.
The Computrace
®
 product family by Absolute
®
 Software allows you to centrally manage your IT 
assets within a single interface – the Absolute Customer Center – where you can identify any 
computers that have gone missing, enforce software policies, and maintain a fleet of optimally 
running devices. And in the event of loss or theft, Computrace can help you recover your computer.
How It Works
Through our partnership with leading computer manufacturers, our Computrace Agent was 
embedded in the firmware of many computers at the factory. Or you can easily install it 
yourself. The Agent is incredibly persistent and allows you to maintain a connection with all of 
your computers regardless if they are off the network and even if the hard drive is completely 
reformatted or replaced. Once the Agent is activated – your computers (and everything on them) 
are protected.
Lost or Stolen
In the event of loss, access the Absolute Customer Center to view the location of the computer. If 
your computer is stolen, contact us. The next time it connects to the internet, the Absolute Theft 
Recovery Team will forensically mine it using a variety of procedures including key captures, 
registry and file scanning, geolocation, and other investigative techniques to determine who 
has your computer and what they’re doing with it. Then we will work closely with local law 
enforcement to recover it.