Absolute- Intelligent Client Side Defense
PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks
Absolute Software*1 and Intel deliver a new level of theft deterrence and data defense through integrated hard-ware and software technologies for notebook PCs. Computrace,* a leading IT asset-management and security solution from Absolute Software, is taking advantage of Intel® Anti-TheftTechnology – PC Protection (Intel® AT-p),2 which is designed into system hardware. Through Computrace, an authorized information technology (IT) administrator can remotely delete data on a notebook, or the notebook can now intelligently lock itself down and prevent an OS from booting. If the notebook is reported lost or stolen, the IT administrator simply flags it in the Computrace Web portal and sets up a“poison pill” so the next time the notebook “phones home,” it will be disabled. In both cases, whether the notebook locks itself down or receives a poison pill, and even if the hard drive is reformatted or replaced, anti-theft security options remain in place. Getting the system operational again is easy – authorized users can quickly restore the system with a one-time reactivation token providedby the IT department. IT now has a more reliable, robust approach to protecting assets and minimizing financial and/or legal risk from lost or stolen notebooks.
Table of Contents
Intelligent client-side defense for lost or stolen notebooks ..................................................3 Traditional challenges in defending data on notebooks .............3 Sensitive data is still highlyvulnerable .................................3 Users and thieves circumvent software-based security measures ......................................3 Costs are high and regulations increasingly strict .................3 Keep sensitive data out of the wrong hands .............................3 Complementing other security measures .............................3 Tamper-resistant technology...............................................4 Faster lock-down and rapid recovery .......................................4 Timer expiry allows for intelligent local response .....................4 Timer expiry works regardless of state of network, OS, BIOS, or hard drive .........................................5 Use case: Undetected theft, but missed check-in locks down notebook............................................5 Use case: End of life disable ...............................................5 PC-disable is rapid and allows full reactivation ........................5 PC disable works regardless of state of OS, BIOS, or hard drive .............................................................6 Use case: Stolen notebook..................................................6 Use case: Lock downnotebook before police report is completed ..................................................6 Data-erase or “bricking” – either way, the notebook is secured ...........................................................6 Easy reactivation and full system restore .................................6 Rapid reactivation when “missing” notebooks are located........................................................................7 Easy deployment .....................................................................7 In the future... ..........................................................................8 Protect assets and data more effectively and lower corporate risk ..........................................................8
Executive Summary
Keeping data secure in a mobile environment isnot just a daunting challenge, but a critical requirement. Loss and theft of notebooks computers leaves sensitive data vulnerable, while financial and legal exposure causes additional problems and disruptions to business. In addition, companies must comply with increasingly stringent regulations in data security and privacy. Computrace,* a leading IT asset-management and security solution from...
Regístrate para leer el documento completo.