Absolute Software | Computrace Products

By: Absolute Software  09-12-2011
Keywords: Theft Recovery

Asset Adminstration

Enjoy the ease of a single interface to manage all of your IT assets within the Absolute Customer Center. You can manage your entire deployment regardless if a device is on or off your company network. Use the data-rich reports to monitor user information, licenses, hardware, installed applications, and other device details.

Data & Device Security


Theft Recovery

Service Guarantee

Keywords: Theft Recovery

Contact Absolute Software


Print this page

Other products and services from Absolute Software


Absolute Software | MDM Overview: Features

Leverage the cross-platform capabilities of Absolute Manage: IT administrators can do their work from a Mac or a PC and there's no need to invest in additional hardware since the Absolute Manage console and server can install in a pre-existing Windows or Mac environment.


Absolute Software | Computrace Mobile Overview: Features

Add to this the growing trend of employees bringing their own devices to work and it's no surprise that endpoint security for ultra-portable devices is more complicated today than ever before. This change has been driven by the need for IT to support remote and mobile workers..and the reality that plenty of business gets done on and off the company network.


Absolute Software | ASD Overview: Features

Industry analysts predict that SEDs will quickly replace traditional software-based encryption solutions which are expensive, can negatively impact computer performance, and often consume significant IT resources to manage encryption keys. Today computer manufacturers are building self-encrypting drives into their devices, providing a standardized, hardware-based method of encryption that ships with the computer.


Absolute Software | Absolute Manage

Centrally manage and install patches – tracking and reporting on the patch status of all managed systems, as well as automatically adding required updates and patches. Deploy a disk image while a computer is in use and automatically migrate user folders, network settings and Directory Access settings with no interruption to users.