Absolute Software SED-GD-MO-SE-M-36 产品数据表
Product datasheet
www.absolute.com
absolute secure drive
© 2011 absolute software corporation. all rights reserved. computrace and absolute are registered trademarks of absolute software corporation. all other trademarks are property of their respective owners. asd-ds-e-032411
Configuration & Management
since the sed is built into the computer, it’s important that your organization owns and controls
the encrypted drive before anyone else can take control of it. With absolute secure drive, It
administrators can:
the encrypted drive before anyone else can take control of it. With absolute secure drive, It
administrators can:
•
set up and configure oPaL seds using strong authentication with Windows login
•
easily deploy through integration with existing active directory/ada M, and Novell edirectory
environments
•
configure sed security features accessible by multiple users and groups of users per oPaL
specifications
•
Manage multiple authentication devices and mechanisms to unlock the hard disk at pre-boot
with sso options
•
recover credentials in case the system crashes or if the authentication device malfunctions
•
decommission seds including at Pc end-of-life with disk drive and data erase
absolute secure drive supports s3 (sleep) mode resume without blue screening or crashing. Plus it
includes a standard plug-in for the Microsoft Management console.
includes a standard plug-in for the Microsoft Management console.
Authentication & Access
It administrators can unlock oPaL seds with the pre-boot authentication module that runs in under
3 seconds from the secure Master Boot record shadow area. strong authentication mechanisms are
supported (Windows passwords and fingerprint scanning) providing single sign-on capabilities so
that users will no longer have to re-authenticate at GINa/credProv login. It administrators can also
perform emergency login and recovery as needed.
3 seconds from the secure Master Boot record shadow area. strong authentication mechanisms are
supported (Windows passwords and fingerprint scanning) providing single sign-on capabilities so
that users will no longer have to re-authenticate at GINa/credProv login. It administrators can also
perform emergency login and recovery as needed.
Linux-based pre-boot authentication means that absolute secure drive is flexible and scalable.
other solutions do not support open source and are limited to text-based log-in with little
customization.
other solutions do not support open source and are limited to text-based log-in with little
customization.
absolute secure drive includes a central administrative console where It can easily configure and
manage seds and users. Your organization will benefit from a significant reduction in the time It
spends on configuration, maintenance, and encryption key management.
manage seds and users. Your organization will benefit from a significant reduction in the time It
spends on configuration, maintenance, and encryption key management.
computrace Persistence
absolute secure drive leverages computrace BIos persistence by allowing the computrace agent to
self-heal onto the encrypted hard drive in the event that the asset is lost or stolen.
self-heal onto the encrypted hard drive in the event that the asset is lost or stolen.
absolute software
absolute software specializes in software and services for the management and security of
computers and mobile devices.
computers and mobile devices.
computrace technology for endpoint security allows our customers to centrally track and secure
their It assets within a single cloud-based console. capabilities include asset administration, data &
device security, Geotechnology, theft recovery, and a service Guarantee.
their It assets within a single cloud-based console. capabilities include asset administration, data &
device security, Geotechnology, theft recovery, and a service Guarantee.
absolute Manage for endpoint management allows our customers to manage Pc, Mac
®
, and ios
devices (iPhone
®
, iPod touch
®
, and iPad
™
). capabilities include application & License Management,
security, change & configuration Management, automated Patch Management, computer Imaging,
asset Inventory, and Power Management.
asset Inventory, and Power Management.
For more information about absolute software and our products visit
www.absolute.com/products
system requirements
•
Windows
®
7™ ultimate, Business
•
Windows
®
Vista™ sP2
•
Windows
®
XP
®
home & Professional sP2
•
Internet explorer 6.0, or above
•
at least 60 MB available hard disk space
OPAL hard drives from these vendors are
supported:
supported:
•
hitachi
•
seagate (including seagate drive trust)
•
toshiba
•
Fujitsu-toshiba
•
Micron
“One of the primary benefits of SEDs is that
the encryption is transparent once the drive
is unlocked. The drive behaves normally and
all transactions appear in clear text at the
interface, which means that no operating system
modifications or RAID management changes are
required, except for unlocking at power-on. There
is also no impact to system or drive performance,
since all data is encrypted on the fly as it is written
to the disk and decrypted as it is read from the
disk, and this performance is scalable because
each SED is responsible for its own encryption.”
the encryption is transparent once the drive
is unlocked. The drive behaves normally and
all transactions appear in clear text at the
interface, which means that no operating system
modifications or RAID management changes are
required, except for unlocking at power-on. There
is also no impact to system or drive performance,
since all data is encrypted on the fly as it is written
to the disk and decrypted as it is read from the
disk, and this performance is scalable because
each SED is responsible for its own encryption.”
John Monroe
Gartner
July 13, 2010
www.absolute.com