Data sheet
Absolute Data & Device Security
Support Service
Care Pack, part of HP Care
Service benets
Life cycle security
Apply a layer of security across the entire
life cycle of each device and receive alerts
if specic conditions occur. Some examples
include securing new devices in transit; validating
end users; and performing hardware/software
inventories, blacklisted applications and
certied end-of-life data delete protocols.
Risk assessment
Monitor device activity and status, and receive
alerts if specic conditions occur. Examples
include non-compliant device location; the
status of complementary security technologies
such as encryption, anti-malware and SCCM;
oine device control; blacklisted applications;
and rogue employees.
Risk response
Remotely invoke security commands and
other measures to avoid a signicant security
incident. Some examples include end-user
messaging, locking a device until its status
is conrmed, denitive proof that endpoint
data and corporate networks were not
accessed while a device was at risk, remote
retrieval and deletion of endpoint data, chain
of custody, and endpoint investigations.
Service overview
The strategic global relationship between Absolute and HP Care provide your organisation with
world-class hardware technology and endpoint security and management for your devices.
Absolute provides persistent endpoint security and data risk management solutions for
computers, tablets and smartphones. Its solutions oer a unique and trusted layer of security,
so customers can manage mobility while remaining rmly in control. With over 30,000
commercial customers worldwide and more than 20 years of experience in the industry,
Absolute is a leader in device security and management tracking. The Absolute Data & Device
Security (DDS) solution (formerly Absolute Computrace
®
) provides your organisation with
actionable intelligence to prove compliance and deliver comprehensive visibility and control
over your devices and data – anytime, anywhere.
Absolute Data & Device Security Support Service oers multiple service levels of Absolute DDS
products to meet your business needs.
Persistence technology
HP devices have Persistence
®
technology embedded in their rmware. Once activated, it
provides a reliable two-way connection, so you can condently manage mobility, investigate
potential threats and take action if a security incident occurs. The ability to communicate with
endpoints – regardless of user or location – means that you can receive timely device and event
information. Most importantly, you can apply remote security measures to protect each device
and the data it contains. No other technology can do this. For a complete listing of HP devices
with Persistence technology embedded in the rmware, visit: absolute.com/en/partners/oem/hp
Specications
Table 1. Service features matrix
Devic e Theft
Investigation
& Recov ery
Absolute DDS
Premium***
Absolute DDS
Professional
Absolute DDS Standard
Absolute DDS for
Educ ation Prem ium
Absolute DDS for
Education Professional
Absolute DDS for
Education Standard
Absolute DDS for
Healthcare Premium*
* A vailabl e in the US onl y
** Sa fe School s is availa ble in Nor th Americ a and the UK o nly
*** Includes Mobile Basic, Mobile Standard and Mobile Premium features
• • • • • • • •
• • • • • • • • •
• • • • • • • •
Healthcare
Endpoint
Investigations Safe S chools* *
Software
Asset Reports
• • • • • • •
• • • • • • •
• •
Security
Reports Geotechnology Geofencing Data Delete Device Freeze
• • •
End Us er
Messaging
Data sh eet | Absol ute Data & Dev ice Securi ty Suppor t Servi ce
Table 2. Service features
Feature Delivery specications
Capability overview Depending on the Absolute DDS Support Service purchased,
the following features may apply:
Repor ting and analytics Collect highly accurate information from each device, including
historical data, and determine what is installed on a device. Identify
events and ac tivities that could be precursors to a security incident,
including changes to IP address, location and user; non-compliant
software/hardware installations; and more. Receive a notication
if these activities occur.
™
Geotechnology Track assets on Google Maps
, including recent and historical
locations. Create geofences based on corporate policies, and
investigate devices that are out of bounds or entering an
unauthorised location.
Risk assessment Identify risk conditions and receive a notication if these conditions
occur. Key security data integrates automatically with security
information and event management (SIEM) solutions. Validate
the status of complementary security applications such as
encryption, anti-malware and System Centre Conguration
Manager (SCCM). Use these reports to prove to auditors that
security measures were properly implemented and in place at
the time of a security incident.
Risk response Remotely recover or delete data. Set policies to ensure oine
devices are automatically protected. Freeze a device and
communicate with the user to verify status. Produce an audit
log to prove that data on a compromised device was properly
secured, not accessed and safely deleted. Use certied data
delete workows to decommission a device.
Endpoint investigations Leverage the Absolute Investigations team to determine the
cause of an endpoint security incident. Identify and eliminate
insider threats. Rene best practices so the same incident does
not reoccur. Determine if data was accessed during an incident,
and whether or not a data breach notication is required.
Recover stolen devices.
Device Theft Investigation &
Recovery
Leverage the Absolute Investigations team to determine the
cause of an endpoint security incident, identify and eliminate
insider threats, rene security best practices, and determine
if data was accessed during an incident, and whether or not a
data breach notication is required.
Healthcare Endpoint
Investigations
Leverage the HealthCare Information Security and Privacy
Practitioners (HCISPPs) and ASIS Certied Protection Professionals
(CPPs) on the Absolute Investigations team to determine the
cause of an endpoint security incident. Identify and eliminate
insider threats. Rene best practices so the same incident does
not reoccur. Determine if data was accessed during an incident,
and whether or not a data breach notication is required.
Absolute Safe Schools Absolute Safe Schools is an integrated programme that works
in conjunction with existing Absolute theft recovery technology.
Overseen by the Absolute Investigations team, Absolute Safe
Schools can help keep students, school environments and
devices safe.
Software Asset Reports Collect incredibly accurate information from each device,
including historical data. Determine what is installed on a
device to ensure compliance.
Security Reports Identify risk conditions and receive a notication if these conditions
occur. Key security data integrates automatically with SIEM solutions.
Validate the status of complementary securit y applications such
as encr yption, anti-malware and SCCM. Use these reports to prove
to auditors that security measures were properly implemented
and in place at the time of a security incident.
Geofencing Create geofences based on organisational policies and receive
analert to investigate devices that are out of bounds or entering
an unauthorised location.
2