Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Device timer regulates offline use of endpoints

Absolute Software : 19 February, 2015  (New Product)
Absolute Computrace enables network administrators to set offline usage policies with a trace and freeze options for endpoints
Device timer regulates offline use of endpoints

Absolute Software has announced an important new security feature for Absolute Computrace - Device Freeze Offline Policy.

This capability allows IT to set an automated freeze command for any device that remains offline for a specific period of time. The policy is engaged each time a device disconnects from the network. When this occurs, a timer will be activated in the device with a duration assigned by IT. If the timer elapses before the device makes contact with the Absolute Monitoring Centre, the device will automatically freeze and IT will be alerted.

The Device Freeze Offline Policy extends the security capabilities of Computrace to devices that may be unassigned or misplaced. For example, organizations with large endpoint inventories can ensure that forgotten devices are secured even if they remain in a dormant state – allowing them to satisfy corporate and regulatory concerns relative to data security and device usage.

The Device Freeze Offline Policy is easily customizable and allows IT to define a window of time that best supports their unique security requirements. To maintain oversight, a summary reporting function is offered that can provide details regarding every endpoint that has been frozen. This allows IT administrators to investigate each device, validate status, and unlock those devices that are not at risk.

“Information security must be enforceable even when a device is not plugged in or powered up,” said Geoff Haydon, CEO at Absolute Software. “With this policy, our customers can actively protect all of their devices – and the sensitive information they contain – regardless of internet connection, user or location.” 

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo