Absolute Software SED-GD-MO-9K-M-12 製品データシート

ページ / 2
Product datasheet
www.absolute.com
absolute secure drive
© 2011 absolute software corporation. all rights reserved. computrace and absolute are registered trademarks of absolute software corporation. all other trademarks are property of their respective owners.  asd-ds-e-032411
Configuration & Management
since the sed is built into the computer, it’s important that your organization owns and controls 
the encrypted drive before anyone else can take control of it. With absolute secure drive, It 
administrators can:
  set up and configure oPaL seds using strong authentication with Windows login
  easily deploy through integration with existing active directory/ada M, and Novell edirectory 
environments
  configure sed security features accessible by multiple users and groups of users per oPaL 
specifications
  Manage multiple authentication devices and mechanisms to unlock the hard disk at pre-boot 
with sso options
  recover credentials in case the system crashes or if the authentication device malfunctions
  decommission seds including at Pc end-of-life with disk drive and data erase 
absolute secure drive supports s3 (sleep) mode resume without blue screening or crashing. Plus it 
includes a standard plug-in for the Microsoft Management console.
Authentication & Access
It administrators can unlock oPaL seds with the pre-boot authentication module that runs in under 
3 seconds from the secure Master Boot record shadow area. strong authentication mechanisms are 
supported (Windows passwords and fingerprint scanning) providing single sign-on capabilities so 
that users will no longer have to re-authenticate at GINa/credProv login. It administrators can also 
perform emergency login and recovery as needed.
Linux-based pre-boot authentication means that absolute secure drive is flexible and scalable. 
other solutions do not support open source and are limited to text-based log-in with little 
customization.
absolute secure drive includes a central administrative console where It can easily configure and 
manage seds and users. Your organization will benefit from a significant reduction in the time It 
spends on configuration, maintenance, and encryption key management.
computrace Persistence
absolute secure drive leverages computrace BIos persistence by allowing the computrace agent to 
self-heal onto the encrypted hard drive in the event that the asset is lost or stolen.
absolute software
absolute software specializes in software and services for the management and security of 
computers and mobile devices.
computrace technology for endpoint security allows our customers to centrally track and secure 
their It assets within a single cloud-based console. capabilities include asset administration, data & 
device security, Geotechnology, theft recovery, and a service Guarantee.
absolute Manage for endpoint management allows our customers to manage Pc, Mac
®
, and ios 
devices (iPhone
®
, iPod touch
®
, and iPad
). capabilities include application & License Management, 
security, change & configuration Management, automated Patch Management, computer Imaging, 
asset Inventory, and Power Management.
For more information about absolute software and our products visit 
www.absolute.com/products
 
system requirements
  Windows
®
 7™ ultimate, Business
  Windows
®
 Vista™ sP2
  Windows
®
 XP
®
 home & Professional sP2
  Internet explorer 6.0, or above
  at least 60 MB available hard disk space
OPAL hard drives from these vendors are 
supported:
  hitachi
  seagate (including seagate drive trust)
  toshiba
  Fujitsu-toshiba
  Micron
“One of the primary benefits of SEDs is that 
the encryption is transparent once the drive 
is unlocked. The drive behaves normally and 
all transactions appear in clear text at the 
interface, which means that no operating system 
modifications or RAID management changes are 
required, except for unlocking at power-on. There 
is also no impact to system or drive performance, 
since all data is encrypted on the fly as it is written 
to the disk and decrypted as it is read from the 
disk, and this performance is scalable because 
each SED is responsible for its own encryption.”
John Monroe 
Gartner
July 13, 2010
www.absolute.com