Absolute Data & Device Security is an adaptive endpoint security solution. It provides you with a persistent connection to all of your endpoints and the data they contain. With Absolute DDS, it's all about the connection. By maintaining a two-way connection with each device, you have the insight you need to assess risk and apply remote security measures so you can protect each endpoint and the sensitive data it contains. This valuable insight is delivered through a cloud-based console that requires no additional IT infrastructure.
Absolute Data & Device Security Professional - For SHRM - subscription license (1 year) - 1 device - Win, Mac, Android
- Security applications - security management, confidential data control
- Subscription license - 1 year
- Society for Human Resource Management (SHRM)
- Risk assessment
Identify risk conditions and receive a notification if these conditions occur. Key security data integrates automatically with SIEM solutions. Validate the status of complementary security applications such as encryption, anti-malware, and SCCM. Use these reports to prove to auditors that security measures were properly implemented and in place at the time of a security incident.
- Reporting and analytics
Collect incredibly accurate information from each device, including historical data. Determine what’s installed on a device. Identify events and activities that could be precursors to a security incident including changes to IP address, location, and user; non-compliant software / hardware installations; and many more. Receive a notification if these activities occur.
- Risk response
Remotely recover or delete data. Set policies to ensure offline devices are automatically protected. Freeze a device and communicate with the user to verify status. Produce an audit log to prove data on a compromised device was properly secured, not accessed, and safely deleted. Use certified data delete workflows to decommission a device.
- Endpoint investigations
Leverage the Absolute Investigations team to determine the cause of an endpoint security incident. Identify and eliminate insider threats. Refine the practices so the same incident does not reoccur. Determine if data was accessed during an incident, and whether or not a data breach notification is required. Recover stolen devices.