Absolute Computrace

Persistently track and secure all of your endpoint devices within a single cloud-based console.

Absolute Computrace allows organizations to persistently track and secure all of their endpoints within a single cloud-based console. Computers, tablets and smartphones can be remotely managed and secured to ensure that endpoint IT compliance processes are properly implemented and enforced.

The reason Computrace works so well, is that it cannot be removed from the device itself. If the Computrace Agent is missing, the persistence module will ensure it automatically reinstalls even if the firmware is flashed, the device is re-imaged, the hard drive is replaced, or if a tablet is wiped clean to factory settings. This is possible because the Absolute persistence module is embedded into the firmware of most computer, tablet, and smartphone devices at the factory (through partnerships with manufacturers such as Acer, Asus, Dell, Fujitsu, HP, Lenovo, Panasonic, Samsung, Toshiba and more).

Asset Administration

Using a cloud-based interface, customers can manage their entire deployment regardless if the device is on or off the network:

  • Collect incredibly accurate and comprehensive information from each device.
  • Create customized policies and alerts to be notified when a change is detected.
  • Asset information includes user identification, physical location, hardware and software, antivirus and encryption status, and hundreds of other data points.

Data & Device Security

If the device is not secure, then the data it contains is at risk. Absolute Computrace allows IT to remotely engage with the device so that data can be safeguarded or removed:

  • Remotely delete sensitive data on computers at risk.
  • Produce an audit log of the deleted files to prove compliance.
  • Freeze a device and send a message to the user.
  • Remotely retrieve files from a device regardless of user or location.

Geotechnology

The physical location of a device can often predict if it is secure or at risk, so knowing where it is (and where it’s been) can be an important factor within your GRC policy:

  • Track assets on an internet map including current and historical locations.
  • Build geofences and receive an alert if a device strays.
  • Investigate and determine device status based on its physical location.

Endpoint Forensics

The ability to understand why and how something happened is critical, especially when proving chain of custody or when criminal activity is suspected. The Absolute Investigations & Recovery team can:

  • Forensically mine a stolen computer regardless of location.
  • Use key captures, registry and file scanning, geolocation, and other investigative techniques to understand how and why a device was breached.
  • Determine who has the computer, what they’re doing with it, and whether any data was accessed.

Theft Recovery

In instances where a criminal act has resulted in the theft of a computer or tablet device, the Absolute Investigations & Recovery team will perform an investigation and provide the results to local police to assist in their criminal investigation. The team has participated in 25,000+ successful recoveries, working closely with police agencies around the world. A Service Guarantee of up to $1,000 is an optional component, available if a recovery or data delete service is not successful (some conditions apply – please get in touch for more details).

Click on a question below to reveal the answer…

Q. What is Absolute persistence?

A. Absolute persistence allows customers to maintain a connection with all of the devices in their deployment. The ability to connect with each device means they can perform management and security actions regardless of user or location.

Absolute persistence is a patented technology and begins with the persistence module which is built into the firmware of desktop, laptop, tablet, and smartphone devices at the factory. We partner with most hardware manufacturers to make this happen. Because it is a part of the device firmware, it is not possible to remove the technology from the device.

Absolute persistence is available for various Absolute software products but will remain dormant until the Computrace software agent is installed. Once the Computrace agent is installed, the agent initiates a call to the Absolute Monitoring Center and Absolute persistence is activated. This means that the status of the software agent is monitored and if it is missing, a reinstallation will automatically occur.

Q. What is the persistence module?

A. The persistence module is installed in the firmware of most desktop, laptop, tablet, and smartphone devices at the factory. Each device leaves the factory with the persistence module in place, waiting to be activated. Activation occurs when a customer purchases an Absolute product that supports persistence and installs the necessary software agents.

Q. How does the Absolute persistence module become embedded into the BIOS or firmware of a device?

A. Through our partnership with leading hardware manufacturers, the Absolute persistence module is embedded in most devices during assembly at the factory.

Q. What is BIOS?

BIOS is the basic input/output system for computers. Its primary function is to identify and initialize system component hardware (like video display cards, hard disks, etc.).

Q. On which manufacturer devices is the persistence module embedded?

A. A current list of all devices manufactured with Absolute persistence embedded in the firmware is available on the absolute.com site at: http://www.absolute.com/en/partners/bios-compatibility

Q. If a device has the Absolute persistence module embedded into the firmware, is it already protected?

A. No. Even though the Absolute persistence module is built into the device, it still requires activation by installing the Computrace software agent.

Once installed, the first call from the software agent to the Absolute Monitoring Center will detect and enable the persistence module. Once enabled, the self-healing feature of the persistence module in the device will initiate the reinstallation of the Computrace and/or Absolute Manage software agent if it is removed.

Q. How persistent is Absolute persistence?

A. Persistence relates to the ability of Absolute software agents to survive events such as operating system reinstallations or if the firmware is flashed, the device is re-imaged, the hard drive is replaced, or if a tablet or smartphone is wiped clean to factory settings.

Absolute persistence is critical in order to survive unauthorized or accidental software agent removal attempts. This extra level of persistence allows customers to track, manage, and secure devices regardless of user or location.

For example, if a security incident occurs, customers can remotely invoke commands such as data delete, device freeze, geolocation, and other remote security measures despite efforts by an unauthorized user to remove the Computrace software agent. In most instances, the unauthorized user is unaware that the device remains under the control of the customer.

The same connection can be used with Absolute Manage to carry out standard and critical asset management tasks such as imaging, patch management, software license management, tablet and smartphone security and management, BYOD oversight, and other IT activities.

Q. What happens if the BIOS is flashed on a computer? Will the Computrace or Absolute Manage software agent need to be reinstalled?

A. No. If the Absolute persistence module has been enabled, the self-healing capability will repair the software agent and the computer will still be protected. The enable/disable state of the persistence module is stored in a part of the BIOS that cannot be flashed to remove it.

Q. Will Absolute persistence continue to work if the computer undergoes an IMAC (install/move/add/change) process such as replacing a hard drive?

A. Yes. The self-healing capability will survive IMAC procedures such as imaging, hard drive replacement or operating system changes.

Q. For computers, what if the Absolute persistence module is not embedded on the device?

A. You can easily install a software version of the persistence module in the partition gap on the hard drive of the computer. This allows the software agent to survive a standard operating system reinstall. However, unlike the firmware embedded model, the software version of Absolute persistence will not survive a hard drive swap.

Related Videos

Comments are closed.

Our clients say we are:

Friendly | Supportive
Knowledgeable | Honest
Efficient | Helpful
Professional

 
 
E-ZU has delivered by far the best Customer Support I have experienced to date. Communications were prompt and friendly. We were able to find a cost-effective solution quickly and at the right price bracket.
 
 
The E-ZU staff's honest and forthright guidance on product options in the early stages was especially refreshing.

I would recommend E-ZU...

 
 
Technical support and sales staff at E-ZU were very willing to go that extra yard to help us achieve our goals by offering up enhancements and fresh design ideas. Excellent experience and a pleasure to deal with.
 
 
Both post and pre sales, the technical chaps at E-ZU have been fantastic. Everyone involved at Codemasters agrees that they bring a benefit above what the product vendor provides on its own.
 
 
The team at E-ZU were very helpful, guiding us to the right unit for our needs. Very little technical support was required but what we did need was dealt with swiftly.

Terms and Conditions | Privacy Statement
© Copyright E-ZU Solutions Ltd 2016