Absolute Software CTTR-GD-10K-60 Folheto
www.absolute.com
Computrace Products
FOR ENDPOINT SEcuRITy
© 2011 Absolute Software Corporation. All rights reserved. Computrace and Absolute are registered trademarks of Absolute Software Corporation. All other trademarks are property of their respective owners. CT-DS-E-041311
“Computrace immediately gave us visibility into
our laptop population. We can see where the
laptop is, who is logging in and what software
is installed. It also allows us to verify that the
laptop’s encryption is up to our standard – which
is key for regulatory compliance. It has taken us
from 30% IT asset auditing capability to well over
95% on computers that are outside our facilities.”
our laptop population. We can see where the
laptop is, who is logging in and what software
is installed. It also allows us to verify that the
laptop’s encryption is up to our standard – which
is key for regulatory compliance. It has taken us
from 30% IT asset auditing capability to well over
95% on computers that are outside our facilities.”
Brad Myrvold
Systems Manager of Desktop Technology
Allina Hospitals & Clinics
www.absolute.com
System Requirements
PC
•
Windows
®
7™ (32 & 64-bit versions)
•
Windows
®
Vista™ (32 & 64-bit versions)
•
Windows
®
XP
®
(32-bit only)
•
Windows
®
2000
•
Windows
®
Server 2008
•
Windows
®
Server 2003
•
Internet connection
Mac
•
Mac
®
OS X v10.3 or higher
•
Internet connection
Absolute Customer Center
•
Windows
®
Internet Explorer
®
•
Mozilla Firefox 3 or above
•
Mac Safari
®
Asset Administration
The Absolute Customer Center is a cloud-based interface where you can manage your
entire deployment regardless if a device is on or off your network. Collect incredibly
accurate and comprehensive information from each device, then create customized
policies and alerts so you can be notified as soon as an unauthorized change is detected.
Asset information includes user identification, physical location, and the installation of
software/hardware that may not comply with government and corporate regulations.
entire deployment regardless if a device is on or off your network. Collect incredibly
accurate and comprehensive information from each device, then create customized
policies and alerts so you can be notified as soon as an unauthorized change is detected.
Asset information includes user identification, physical location, and the installation of
software/hardware that may not comply with government and corporate regulations.
Data & Device Security
Remotely delete sensitive data on missing computers and produce an audit log of the
deleted files to prove compliance with government and corporate regulations. Device
Freeze allows you to freeze a computer and display a custom message to the user
instructing them to comply with specific requests for action (return for servicing, validate
user identity, etc.). Remote File Retrieval allows you to obtain files from a device even if
it is not within your control.
deleted files to prove compliance with government and corporate regulations. Device
Freeze allows you to freeze a computer and display a custom message to the user
instructing them to comply with specific requests for action (return for servicing, validate
user identity, etc.). Remote File Retrieval allows you to obtain files from a device even if
it is not within your control.
Geotechnology
Use GPS (if the device is equipped with a receiver) or Wi-Fi technology to track your
assets on an internet map including current and historical locations. Build predefined
areas (geofences) and receive alerts if a condition occurs such as a device remaining
outside a boundary beyond a set measure of time. Use the physical location of a device
to investigate and determine if further action is required.
assets on an internet map including current and historical locations. Build predefined
areas (geofences) and receive alerts if a condition occurs such as a device remaining
outside a boundary beyond a set measure of time. Use the physical location of a device
to investigate and determine if further action is required.
Theft Recovery
If your computer is stolen, the Absolute Theft Recovery team will work with local police
to locate it and return it to you. We recover thousands of computers each year.
to locate it and return it to you. We recover thousands of computers each year.
Service Guarantee
You will be eligible to receive up to $1000, if we are unable to recover your computer or
perform the data delete service. Some conditions apply.
perform the data delete service. Some conditions apply.
For more details visit:
www.absolute.com/service-agreement
Computrace Products
Asset
Administration
Data & Device
Security
Geotechnology Theft Recovery
Service
Guarantee
Computrace Complete
•
•
•
•
•
Computrace Plus
•
•
•
Absolute Track
•
•
Computrace Data Protection
•
•
•
Computrace Mobile
•
•
•
•
•
View the
for a detailed overview of features by product.