Листовка для Absolute Software CTC-GD-9999-36U CTC-GD-9999-36
Модели
CTC-GD-9999-36
www.absolute.com
Computrace Products
FOR ENDPOINT SEcuRITy
Manage
Monitor and manage all of your IT assets within
the Absolute Customer Center (regardless if a
device is on or off your network).
the Absolute Customer Center (regardless if a
device is on or off your network).
Protect
In the event of loss or theft, remotely delete all
sensitive information and generate reports to
prove your compliance with government and
corporate regulations.
sensitive information and generate reports to
prove your compliance with government and
corporate regulations.
Recover
Report a theft and engage the Absolute Theft
Recovery Team who will work with local law
enforcement to recover your property.
Recovery Team who will work with local law
enforcement to recover your property.
Guaranteed!
Receive up to $1000, if we are unable to recover
your computer.
your computer.
Asset
Administration
Data & Device
Security
Theft
Recovery
Geotechnology
Service
Guarantee
“Track and
Secure Me.”
Customer view of IT assets within Absolute Customer Center, with geofencing enabled.
Business moves quickly and so do your people. In today’s world of technology, data can be
accessed and shared 24 hours a day from just about any location. So how well can you account for
your corporate IT assets? And what about the data they hold? Failure to monitor and control this
part of your business can lead to data breach penalties – and even worse, the type of negative
publicity that can take years to repair.
accessed and shared 24 hours a day from just about any location. So how well can you account for
your corporate IT assets? And what about the data they hold? Failure to monitor and control this
part of your business can lead to data breach penalties – and even worse, the type of negative
publicity that can take years to repair.
The Computrace
®
product family by Absolute
®
Software allows you to centrally manage your IT
assets within a single interface – the Absolute Customer Center – where you can identify any
computers that have gone missing, enforce software policies, and maintain a fleet of optimally
running devices. And in the event of loss or theft, Computrace can help you recover your computer.
computers that have gone missing, enforce software policies, and maintain a fleet of optimally
running devices. And in the event of loss or theft, Computrace can help you recover your computer.
How It Works
Through our partnership with leading computer manufacturers, our Computrace Agent was
embedded in the firmware of many computers at the factory. Or you can easily install it
yourself. The Agent is incredibly persistent and allows you to maintain a connection with all of
your computers regardless if they are off the network and even if the hard drive is completely
reformatted or replaced. Once the Agent is activated – your computers (and everything on them)
are protected.
embedded in the firmware of many computers at the factory. Or you can easily install it
yourself. The Agent is incredibly persistent and allows you to maintain a connection with all of
your computers regardless if they are off the network and even if the hard drive is completely
reformatted or replaced. Once the Agent is activated – your computers (and everything on them)
are protected.
Lost or Stolen
In the event of loss, access the Absolute Customer Center to view the location of the computer. If
your computer is stolen, contact us. The next time it connects to the internet, the Absolute Theft
Recovery Team will forensically mine it using a variety of procedures including key captures,
registry and file scanning, geolocation, and other investigative techniques to determine who
has your computer and what they’re doing with it. Then we will work closely with local law
enforcement to recover it.
your computer is stolen, contact us. The next time it connects to the internet, the Absolute Theft
Recovery Team will forensically mine it using a variety of procedures including key captures,
registry and file scanning, geolocation, and other investigative techniques to determine who
has your computer and what they’re doing with it. Then we will work closely with local law
enforcement to recover it.