Absolute Software - Security Solutions for Mobile Computers and Smartphones

Absolute Software - Security Solutions for Mobile Computers and Smartphones
Absolute® Software specialises in technology and services for the management and security of mobile computers and smartphones.

For individuals, Absolute provides peace-of-mind by physically recovering stolen computers and remotely deleting sensitive files from them. For businesses, we deliver state-of-the-art IT asset management – allowing enterprises to reduce IT costs, address regulatory compliance, combat computer theft and optimise the productivity of their mobile computer fleets.

Absolute’s security-as-a-service solutions protect millions of computers worldwide and our subscribers range from individuals to the largest public and private sector organisations.


Our technology

The Computrace® Agent is a small software client that is embedded into the firmware of a computer at the factory. Through our strong relationships with computer manufacturers, most computers roll off the assembly line with our Agent already embedded. Or it can be easily installed with a simple download. Once activated, the Agent maintains daily contact with the Absolute Monitoring Centre.

Computrace provides the following capabilities:


Asset management

Manage computers and smartphones (regardless if a device is on or off the company network). Monitor changes in asset information including user identification, physical location, and the installation of software/hardware that may not comply with company regulations.


Remotely delete sensitive data

Delete data on missing computers and produce an audit log of the deleted files to prove compliance with government and corporate regulations. Set alerts to be notified if noncompliance activities occur, including initiating a process to wipe a device clean if pre-set criteria is met.


Geolocation tracking

Use GPS or Wi-Fi technology to track assets on a Google™ map. See current and historical locations within about 10m.


Theft recovery

The Absolute Theft Recovery team will forensically mine a stolen computer over the internet using a variety of procedures including key captures, registry and file scanning, geolocation, and other investigative techniques to determine who has the computer and what they’re doing with it. Most importantly, we will use our technology to pinpoint the physical location of the computer and work closely with local law enforcement to recover it.


As a registered user of CBR you can skip the majority of this form. Registration is FREE so register now or log in if you're already a member.

Request Further Information

I have read and accept the terms and conditions and privacy policy.
We'd like to keep you informed about relevant promotions, products and services, or if you would prefer not to receive these, uncheck this box.
If you would prefer not to hear from carefully selected third party companies uncheck this box

Join our network

756 people like this.
0 people follow this.

Related Intelligence and Suppliers

Absolute Software White Papers

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.