(Go: >> BACK << -|- >> HOME <<)

SPECIAL ADVERTISING PARTNER 
Mobile Security Zone

white papers

Endpoint Security: When Encryption Isn't Enough

Endpoint Security: When Encryption Isn't Enough

Missing laptops and mobile devices continue to be the number one cause of data breaches. Research indicates that over 60% of data breaches are caused by careless employees or insider theft. This white paper provides a case for endpoint security that remains effective regardless of end-user reliability.

»download white paper

Endpoint Security: When Encryption Isn't Enough

Intelligent Client-Side Defense for Stolen Computers by Intel® and Absolute

The combination of Absolute's SaaS-based computer tracking and Intel's hardware-based Anti-Theft technology gives you an unprecedented level of theft deterrence and data defense. Find out how you can remotely delete data and disable stolen computers — online, offline and anywhere in the world.

»download white paper

The Human Factor in Laptop Encryption

The Human Factor in Laptop Encryption

This Ponemon Institute whitepaper examines the behavior of non-IT employees when it comes to encryption policy. It shows that many employees may not be taking the most basic precautions to protect their company laptop.

»download white paper

Secure Mobility with Absolute Software

Secure Mobility with Absolute Software

Absolute Software allows you to centrally manage computers and mobile devices via any internet connection. In this product overview, learn how you can maintain an inventory of optimally running devices, identify computers that go missing and take action when they do.

»download white paper

success stories

Success Story: Grant Thornton LLP

Success Story: Grant Thornton LLP

Grant Thornton needed to reduce computer loss rates and streamline IT asset management across 49 offices. The company used Computrace by Absolute Software to recover and wipe data from laptops before end-of-lease. With Computrace, the company has reduced costs by increasing asset visibility to 100%.

»download success story

Success Story: Allina Hospitals & Clinics

Success Story: Allina Hospitals & Clinics

With an electronic health record system spanning 11 hospitals, Allina required a way to protect 2,700 laptops. Using Computrace, Allina has improved tracking from 30% to over 95% of computers outside facilities, and has averted several possible data breaches.

»download success story

webinar

Webinar: Managing Laptops Outside the Office

In this webinar, learn how you can reduce costs by tracking mobile computers no matter where they are located. Featuring the specialist of IT asset management at a major insurance group, this webinar discusses the business value of internet-based auditing and theft recovery.

view webinar

demo

Demo: How Computrace Tracks and Secures Laptops

View this flash demo to see Absolute in action. No matter where computers are connected, you can monitor installed software/hardware, track location using GPS and WiFi and take action if a device is lost or stolen.

demo

Laptops and mobile devices continue to go missing due to poor visibility once they leave the network. Absolute Software can help by giving you a complete view of mobile computers from a single web-based interface along with powerful anti-theft capabilities to keep your data safe.