

- ABSOLUTE LOJACK BEST DEAL INSTALL
- ABSOLUTE LOJACK BEST DEAL MANUAL
- ABSOLUTE LOJACK BEST DEAL CODE
- ABSOLUTE LOJACK BEST DEAL PC
- ABSOLUTE LOJACK BEST DEAL SERIES
Tarca's office also uses Computrace to keep tabs on the 700 or so laptops utilized by faculty. "We needed to provide better asset management and theft deterrence," says Fred Tarca, the school's director of administration and operations. For example, Dell customer Quinnipiac University, just north of New Haven, Conn., has Computrace installed on all the Dell Latitude laptops that incoming freshmen are required to purchase.
ABSOLUTE LOJACK BEST DEAL PC
The lion's share of Absolute's sales come via its PC partners, who pre-install Computrace and offer it to their corporate and educational sector clients.
ABSOLUTE LOJACK BEST DEAL MANUAL
(Previously, Absolute's software was offered as an add-on feature, requiring manual installation.)
ABSOLUTE LOJACK BEST DEAL CODE
The BIOS (short for Basic Input/Output System) contains essential software code that allows computer components, like the keyboard and mouse, to function when first turned on, before the Windows operating system kicks in.īeing baked into the laptop makes Computrace almost impossible to remove, even if the hard drive gets wiped clean. Clients can also, if they choose, remotely delete data post-theft.Ībsolute has taken off over the past two years thanks to deals it has cut with top PC makers like Dell ( Charts), HP ( Charts), Fujitsu, Lenovo and Gateway ( Charts) to embed Computrace in the so-called BIOS on millions of computers. When the stolen computer connects to the Internet, the Computrace software provides its location to Absolute's 12-person recovery team, which then works with local law enforcement to recover the PC. Here's how Computrace works: If a PC is stolen, clients dial an 800 number or report the theft to Absolute via the Internet. Founded 12 years ago, Computrace today protects over 800,000 computers and has helped everyone from San Francisco high school students to global accounting firms to Canadian oilfield equipment suppliers retrieve stolen or waylaid PCs.

One solution.One security tool that's becoming as ubiquitous as bike locks on city streets is Computrace laptop recovery and tracking software, made by a company out of Vancouver called Absolute Software. The ideal compliment to insurance for total product protectionĪbsolute LoJack. Make your device the most secure on the planetĪdd Absolute LoJack to be the most secure device on the planetĬo-Brand or White Label an Absolute LoJack ProductĪbsolute LoJack Theft Recovery and Security Products Samsung Enterprise Alliance Program (SEAP)Įnhanced SAFE API support with Absolute Manage MDM
ABSOLUTE LOJACK BEST DEAL SERIES
Include in Services Portfolio to build attach or upsellĬomputrace BIOS persistent on Series 2-9 Windows NotebooksĬomputrace Firmware Persistence on 100M+ flagship Galaxy
ABSOLUTE LOJACK BEST DEAL INSTALL
The larger the install base, the larger the revenue stream Retail Gift Card with “protected” device labelīuild a recurring revenue stream as a bundle or stand alone Industry Leading theft recovery solution with strong brand identificationīundle Absolute LoJack to Add Revenue and Margin The only solution than can safely recover a stolen device, while providingįeatures to protect the data on the device.ĭifferent Go To Market Programs to meet Your business objectives

Persistence the only solution designed to survive a factory reset Upping the Ante in Device Theft Recovery.Ībsolute LoJack Competitive Differentiation Jack Wraith, chairman of the Mobile Industry Crime Action Forum,Ībsolute LoJack Competitive Differentiation:Ībsolute Investigation and Recovery Services Team. Huffington Post: March 2013 “Apple Picking: How the iPhoneīecame An Object Worth Killing For” 4. Ponemon Institute 2008 - Airport Insecurity: the case of lost laptops 3. Absolute Software - 2012 End Point Management Report 2. Top Officials Publicly Pressure manufacturers to solve the problem.ġ. Over 30 Trusted Partners around the world Remotely track, manage, secure & recover devices.Ĭentrally track and secure IT assets within a cloud-basedĬomplete end-to-end lifecycle management for iOS,Īndroid, Windows Phone, PC & Mac devices.
