Menu

Company Profile

Absolute provides persistent endpoint security and data risk management solutions for computers, tablets, and smartphones.
Absolute Data & Device Security (DDS), formerly Computrace®, is an adaptive endpoint security solution. It provides a persistent connection to all of your endpoints and the data they contain even if a device is off the network or in the hands of an unauthorised user. The ability to communicate with your endpoints means you can receive timely device and event information. Most importantly, you can apply remote security measures to protect each device and the data it contains. No other technology can do this.

Absolute Seminars

  • Absolute presents: Hedging Your Bets: A Layered Approach to Security Geoff Glave  |   Absolute   |   Wed 5th Oct 15:00 - 15:30

    Cyber Security Disruptive Technologies Theatre

    Wed 5th Oct 15:00 to 15:30

    Absolute presents: Hedging Your Bets: A Layered Approach to Security

    Ten years ago it was all about keeping things out with most organisations focussed on firewalls, anti-virus, and encryption. Today it’s a given that many risks have already made it past the front door – which, with mobility, can be accessed from just about anywhere in the world. As a result, many organisations have upped their game, employing a strong playbook involving multiple players so they can tackle and respond to each play as it happens – and with significant back-up if a player goes down.

    Join Geoff Glave from Absolute for an insightful presentation on the strategic benefits of applying a layered approach to security. The session will include examples of security incidents that could have been avoided if this approach had been in place.

    Speaker

    Photo Speaker Name Profile
    Geoff Glave Geoff Glave View Profile

White papers

Compliance Sea Change: How to best comply with the new EU Data Protection Regime
ABT-EMEA-EU GDPR Whitepaper-General.pdf 644.67 kB


Top 6 Security Considerations when migrating to Microsoft Windows 10
ABT-EMEA-Top 6 Security Considerations Whitepaper.pdf 363.48 kB


The Insider Threat
abt-insider-threat-wp.pdf 309.19 kB


The enemy within
abt-the-enemy-within-wp-e.pdf 335.39 kB


Absolute Overview
ABT-Corporate Brochure.pdf 1.95 MB


Social Media

Twitter

Linkedin

IP EXPO | LinkedIn

The home of IP EXPO Event Series

Facebook