Electronics   >   Software   >   Security
Absolute Resilience main image Roll over main image to zoom in. Click to open expanded view.
Absolute Resilience - Image 1: Main

Absolute Resilience - Subscription license (2 years) - 1 device - academic, local, state - North America

Price:  

For pricing or to order this product:

Call our Sales Representatives

Mon-Fri 8am-6:30pm CST

E-Mail

Answer within 2 hours

Was $8295 Save 26%

Availability: 

10-14+ Days
This item will be shipped directly from the manufacturer.
Leadtime to shipment will be a minimum of 10-14 working days.
Call for further shipping details. - (888) 912-3151 or E-Mail

Brand: 

Absolute Software

MPN: 

DDSPRME-F-EDU-24

Condition: 

new

Returnable: 

This Product Has Limited Exchange Privileges. For support on this product, please contact @ .

Absolute is the standard for Endpoint Visibility and Control, delivering the only self-healing solution embedded in more than 1 billion devices. Absolute gives you control over devices, data, applications, and users - on and off the network - for always-connected IT asset management, self-healing endpoint security, and continuous data protection. Absolute Resilience - for Education and State & Local Government - provides always-on visibility and remediation to protect devices, data, applications and users. This includes all Absolute Visibility and Control features, plus Absolute QuickStart, Absolute Reach, Data Awareness, Device Theft Investigation & Recovery, Service Guarantee, Endpoint Investigations and Application Persistence for Microsoft Applications, and in Education the popular Safe Schools Program.

Absolute Resilience - Subscription license (2 years) - 1 device - academic, local, state - North America
General
Category:
  • Security applications - security management, confidential data control
Product Type:
  • Subscription license - 2 years
Localization:
  • North America
Licensing
License Qty:
  • 1 device
License Pricing:
  • Academic, local government, state government
  • Risk assessment
    Identify risk conditions and receive a notification if these conditions occur. Key security data integrates automatically with SIEM solutions. Validate the status of complementary security applications such as encryption, anti-malware, and SCCM. Use these reports to prove to auditors that security measures were properly implemented and in place at the time of a security incident.
  • Risk response
    Remotely recover or delete data. Set policies to ensure offline devices are automatically protected. Freeze a device and communicate with the user to verify status. Produce an audit log to prove data on a compromised device was properly secured, not accessed, and safely deleted. Use certified data delete workflows to decommission a device.
  • Endpoint investigations
    Leverage the Absolute Investigations team to determine the cause of an endpoint security incident. Identify and eliminate insider threats. Refine best practices so the same incident does not reoccur. Determine if data was accessed during an incident, and whether or not a data breach notification is required. Recover stolen devices.
  • Reporting and analytics
    Collect incredibly accurate information from each device, including historical data. Determine what's installed on a device. Identify events and activities that could be precursors to a security incident including changes to IP address, location, and user; non-compliant software/ hardware installations; and many more. Receive a notification if these activities occur.
  • Geotechnology
    Track assets on a Google Map, including recent and historical locations. Create geofences based on corporate policies. Investigate devices that are out of bounds or entering an unauthorized location.

S17242041 Absolute Software DDSPRME-F-EDU-24 000000000000 Absolute Resilience new
InStock
Facebook icon Twitter icon YouTube icon Pinterest icon Instagram icon LinkedIn icon
©2000-2023 Howard Technology Solutions, a division of Howard Industries, Inc.
Discover Visa PayPal MasterCard American Express