Absolute Software - Security Solutions for Mobile Computers and Smartphones

Absolute Software - Security Solutions for Mobile Computers and Smartphones White Papers

PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks

Absolute Software*1 and Intel deliver a new level of theft deterrence and data defence through integrated hardware and software technologies for notebook PCs. Computrace,* a leading IT asset-management and security solution from Absolute Software, is taking advantage of Intel® Anti-Theft Technology (Intel AT) 2 which is designed into system hardware. Through Computrace, an authorised information technology (IT) administrator can remotely delete data on a notebook, or the notebook can now intelligently lock itself down and prevent an OS from booting. If the notebook is reported lost or stolen, the IT administrator simply flags it in the Computrace web portal and sets up a "poison pill" so the next time the notebook "phones home", it will be disabled. In both cases, whether the notebook locks itself down or receives a poison pill, and even if the hard drive is reformatted or replaced, anti-theft security options remain in place. Getting the system operational again is easy – authorised users can quickly restore the system with a one-time reactivation token provided by the IT department. IT now has a more reliable, robust approach to protecting assets and minimising financial and/or legal risk from lost or stolen notebooks.

View white paper

The Human Factor in Laptop Encryption: UK Study

Encryption is one of the most important security tools in the defense of information assets. Ponemon Institute has conducted numerous studies on organizations’ use of encryption to prevent the loss of sensitive and confidential information. These studies have shown that encryption can be an effective deterrent. However, our studies also show that in order to be effective, encryption requires organizations and users to take appropriate steps to make sure sensitive and confidential information is protected as much as possible. Download this free white paper to read more.

View white paper