ABSOLUTE COMPUTRACE COMPLETE FOR ENDPOINT SECURITY
Manage the health and deployment of each Toughbook, Toughpad, and other mobile devices within a single console. These licenses are not machine specific.
This is pricing for basic Computrace Services
Description | Enterprise/Retail | State/Local Govt/Education | Federal Goverment | |
Complete 3 Year | CF-SVCASCTC3Y $129 | ST-SECCTCEDGV3YR $111 | ST-SECCTCGOV3Y $103 | |
Complete 4 Year | CF-SVCASCTC4Y $159 | ST-SECCTCEDGV4YR $137 | ST-SECCTCGOV4Y $127 | |
Complete 5 Year | CF-SVCASCTC5Y $189 | ST-SECCTCEDGV5YR $163 | ST-SECCTCGOV5Y $151 |
Absolute Computrace allows you to persistently secure all of your endpoints, and the sensitive data they contain, to ensure—and most importantly prove—that endpoint IT compliance processes are properly implemented and enforced.
Read our Absolute Computrace datasheet to learn how organizations stay connected with each device in their deployment.
This is a detailed feature overview of Computrace products that provide endpoint security for desktop and laptop computers.
Monitor device activity and status, and receive alerts if predefined conditions occur. Examples include non-compliant device location, the status of complementary security technologies such as encryption and anti-malware, offline device control, blacklisted applications, rogue employees, etc.
Apply a layer of security across the entire lifecycle of each device and receive alerts if predefined conditions occur. Examples include securing new devices in transit, validating end users, hardware / software inventories, blacklisted applications, certified end of life data delete protocols, etc.
Remotely invoke security commands and other measures to avoid a significant security incident. Examples include end user messaging, locking a device until its status is confirmed, definitive proof that endpoint data and corporate networks were not accessed while a device was at risk, remote retrieval and deletion of endpoint data, chain of custody, internal investigations, etc.
Persistence technology from Absolute provides you with visibility and control over all of your devices, regardless of user or location. If an Absolute software client is removed from an endpoint, it will automatically reinstall so you can secure each device and the sensitive data it contains. No other technology can do this.
Watch the Persistence video to learn more.