2
DATA PROTECTION & IT ASSET MANAGEMENT Computrace Data Protection 1 800 220 0733 | www.absolute.com Protect Your Business With Computrace Data Protection Your Data Is Your Responsibility – Protect It! Protecting your data is no longer an option, it is a requirement. Government legislation mandates that organizations must publicly report any security breach that is reasonably believed to have compromised personal information. Yet 66% of breaches involve data the company did not know was on their systems. 1 If a computer goes missing, you need to be sure that the sensitive information on it does not fall into the wrong hands. Minimize Corporate Liability - Permanently Delete Data Computrace Data Protection gives you the ability to delete data from computers, on or off the network. Once removed data cannot be recovered, because Computrace uses a data delete algorithm that meets the US Department of Defense standard for data removal (DoD deletion standard DOD5220.22-M). Delete sensitive data at the end of life or lease Prove compliance measures with report details Delete everything or target specific files Prevent Data Loss – on or off the LAN Computrace Data Protection takes your IT asset management further. Unlike traditional asset management systems, Computrace Data Protection can track mobile computers anywhere they connect to the Internet. That means you can remotely delete data and know where a computer is located even it it’s not connected to your network. With Computrace Data Protection, you get reports on changes in asset information on a daily basis – regardless of user or location. Secure IT Asset Management With Computrace Data Protection, you can centrally manage your entire computer population, including remote and mobile assets. Reports enable you to locate and computers that have drifted within your organization, have gone missing or have been used for unauthorized activities. You also can see changes in software and hardware. Knowing who has the asset, what software and hardware is installed on it and where it is located helps you comply with government regulations. Persistent Technology Computrace Data Protection is powered by the Computrace Agent. This patented software is embedded in the firmware of computers from the world’s leading computer manufacturers right at the factory for tamper-resistance. 3 The stealthy Computrace Agent is capable of surviving operating system re-installations, as well as hard-drive reformats, replacements and re-imaging. The Agent calls into the Absolute Monitor Center once every day to report asset information to you. Consider: A data breach costs $197 per missing record. 3

data protection & it asset management - Dell USA · 2009-02-25 · Computrace Data Protection takes your IT asset management further. Unlike traditional asset management systems,

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: data protection & it asset management - Dell USA · 2009-02-25 · Computrace Data Protection takes your IT asset management further. Unlike traditional asset management systems,

data protection & it asset management

Computrace Data Protection

1 800 220 0733 | www.absolute.com

Protect Your Business With Computrace Data Protection

Your Data Is Your Responsibility – Protect It!

Protecting your data is no longer an option, it is a requirement.

Government legislation mandates that organizations must publicly

report any security breach that is reasonably believed to have

compromised personal information. Yet 66% of breaches involve

data the company did not know was on their systems.1 If a

computer goes missing, you need to be sure that the sensitive

information on it does not fall into the wrong hands.

Minimize Corporate Liability - Permanently Delete Data

Computrace Data Protection gives you the ability to delete data

from computers, on or off the network. Once removed data

cannot be recovered, because Computrace uses a data delete

algorithm that meets the US Department of Defense standard for

data removal (DoD deletion standard DOD5220.22-M).

• Delete sensitive data at the end of life or lease

• Prove compliance measures with report details

• Delete everything or target specific files

Prevent Data Loss – on or off the LAN

Computrace Data Protection takes your IT asset management

further. Unlike traditional asset management systems,

Computrace Data Protection can track mobile computers

anywhere they connect to the Internet. That means you can

remotely delete data and know where a computer is located even

it it’s not connected to your network. With Computrace Data

Protection, you get reports on changes in asset information on a

daily basis – regardless of user or location.

Secure IT Asset Management

With Computrace Data Protection, you can centrally manage your

entire computer population, including remote and mobile assets.

Reports enable you to locate and computers that have drifted

within your organization, have gone missing or have been used

for unauthorized activities. You also can see changes in software

and hardware. Knowing who has the asset, what software and

hardware is installed on it and where it is located helps you

comply with government regulations.

Persistent Technology

Computrace Data Protection is powered by the Computrace

Agent. This patented software is embedded in the firmware of

computers from the world’s leading computer manufacturers right

at the factory for tamper-resistance.3 The stealthy Computrace

Agent is capable of surviving operating system re-installations, as

well as hard-drive reformats, replacements and re-imaging. The

Agent calls into the Absolute Monitor Center once every day to

report asset information to you.

Consider:

A data breach costs $197 per missing record.3

Page 2: data protection & it asset management - Dell USA · 2009-02-25 · Computrace Data Protection takes your IT asset management further. Unlike traditional asset management systems,

data protection & it asset management

Computrace Data Protection

1 800 220 0733 | www.absolute.com

Delete Everything or Target Specific Files

Computrace Data Protection can remove data at the file, directory or operating system level. Deletion options for pre-authorized administrators include:

• Data Delete with Operating System (OS) – All files including the OS

• Data Delete excluding OS – All files except the OS

• File or Directory-Specific Data Delete4 – Choose specific files, file-types and/or directories

• Customized policies4 – Specific sets of files and folders on PCs as defined by you

Predefined Reports & Custom Asset Tracking

Absolute’s Customer Center features 30 predefined reports, as well as the option to create custom reports or assign user-defined fields. Manage your IT assets from one website:

• Track computers on or off your network

• Get GPS coordinates for computers with supported wireless modules5

• Create predefined alerts to manage users who are operating outside corporate policies

• Proactively diagnose problems remotely

• Use reports to plan and budget for individual or company-wide upgrades, migrations and machine retirement

1 Verizon, 2008 Data Breach Investigations Report 2 Ponemon Institute, U.S. Cost of a Data Breach, 2007 3 For a complete list of firmware-supported computers visit www.absolute.com/firmware. 4 Available for PCs only. 5 For complete list of supported GPS receivers visit www.absolute.com/geolocation. © 2008 Absolute Software Corporation. All rights reserved. Computrace and Absolute are registered trademarks of Absolute Software Corporation. All other trademarks are property of their respective owners. September 11, 2008

Here’s How It Works