Absolute U8UP1E Product Data Sheet

Data sheet
Absolute Data & Device Security
Support Service
Care Pack, part of HP Care
Service benets
Life cycle security
Apply a layer of security across the entire life cycle of each device and receive alerts
if specic conditions occur. Some examples
include securing new devices in transit; validating end users; and performing hardware/software inventories, blacklisted applications and
certied end-of-life data delete protocols.
Risk assessment
Monitor device activity and status, and receive
alerts if specic conditions occur. Examples
include non-compliant device location; the status of complementary security technologies such as encryption, anti-malware and SCCM;
oine device control; blacklisted applications;
and rogue employees.
Risk response
Remotely invoke security commands and
other measures to avoid a signicant security incident. Some examples include end-user
messaging, locking a device until its status is conrmed, denitive proof that endpoint data and corporate networks were not accessed while a device was at risk, remote retrieval and deletion of endpoint data, chain of custody, and endpoint investigations.
Service overview
The strategic global relationship between Absolute and HP Care provide your organisation with world-class hardware technology and endpoint security and management for your devices.
Absolute provides persistent endpoint security and data risk management solutions for
computers, tablets and smartphones. Its solutions oer a unique and trusted layer of security, so customers can manage mobility while remaining rmly in control. With over 30,000 commercial customers worldwide and more than 20 years of experience in the industry,
Absolute is a leader in device security and management tracking. The Absolute Data & Device Security (DDS) solution (formerly Absolute Computrace
®
) provides your organisation with actionable intelligence to prove compliance and deliver comprehensive visibility and control over your devices and data – anytime, anywhere.
Absolute Data & Device Security Support Service oers multiple service levels of Absolute DDS
products to meet your business needs.
Persistence technology
HP devices have Persistence
®
technology embedded in their rmware. Once activated, it
provides a reliable two-way connection, so you can condently manage mobility, investigate
potential threats and take action if a security incident occurs. The ability to communicate with endpoints – regardless of user or location – means that you can receive timely device and event information. Most importantly, you can apply remote security measures to protect each device and the data it contains. No other technology can do this. For a complete listing of HP devices with Persistence technology embedded in the rmware, visit: absolute.com/en/partners/oem/hp
Specications
Table 1. Service features matrix
Devic e Theft
Investigation
& Recov ery
Absolute DDS Premium***
Absolute DDS Professional
Absolute DDS Standard
Absolute DDS for
Educ ation Prem ium
Absolute DDS for
Education Professional
Absolute DDS for
Education Standard
Absolute DDS for Healthcare Premium*
* A vailabl e in the US onl y ** Sa fe School s is availa ble in Nor th Americ a and the UK o nly *** Includes Mobile Basic, Mobile Standard and Mobile Premium features
Healthcare
Endpoint
Investigations Safe S chools* *
Software
Asset Reports
Security Reports Geotechnology Geofencing Data Delete Device Freeze
End Us er
Messaging
Data sh eet | Absol ute Data & Dev ice Securi ty Suppor t Servi ce
Table 2. Service features
Feature Delivery specications
Capability overview Depending on the Absolute DDS Support Service purchased,
the following features may apply:
Repor ting and analytics Collect highly accurate information from each device, including
historical data, and determine what is installed on a device. Identify events and ac tivities that could be precursors to a security incident, including changes to IP address, location and user; non-compliant
software/hardware installations; and more. Receive a notication
if these activities occur.
Geotechnology Track assets on Google Maps
, including recent and historical locations. Create geofences based on corporate policies, and investigate devices that are out of bounds or entering an unauthorised location.
Risk assessment Identify risk conditions and receive a notication if these conditions
occur. Key security data integrates automatically with security
information and event management (SIEM) solutions. Validate
the status of complementary security applications such as
encryption, anti-malware and System Centre Conguration
Manager (SCCM). Use these reports to prove to auditors that security measures were properly implemented and in place at the time of a security incident.
Risk response Remotely recover or delete data. Set policies to ensure oine
devices are automatically protected. Freeze a device and communicate with the user to verify status. Produce an audit log to prove that data on a compromised device was properly
secured, not accessed and safely deleted. Use certied data delete workows to decommission a device.
Endpoint investigations Leverage the Absolute Investigations team to determine the
cause of an endpoint security incident. Identify and eliminate
insider threats. Rene best practices so the same incident does
not reoccur. Determine if data was accessed during an incident, and whether or not a data breach notication is required. Recover stolen devices.
Device Theft Investigation &
Recovery
Leverage the Absolute Investigations team to determine the cause of an endpoint security incident, identify and eliminate insider threats, rene security best practices, and determine if data was accessed during an incident, and whether or not a
data breach notication is required.
Healthcare Endpoint Investigations
Leverage the HealthCare Information Security and Privacy Practitioners (HCISPPs) and ASIS Certied Protection Professionals (CPPs) on the Absolute Investigations team to determine the cause of an endpoint security incident. Identify and eliminate insider threats. Rene best practices so the same incident does not reoccur. Determine if data was accessed during an incident,
and whether or not a data breach notication is required.
Absolute Safe Schools Absolute Safe Schools is an integrated programme that works
in conjunction with existing Absolute theft recovery technology. Overseen by the Absolute Investigations team, Absolute Safe
Schools can help keep students, school environments and devices safe.
Software Asset Reports Collect incredibly accurate information from each device,
including historical data. Determine what is installed on a device to ensure compliance.
Security Reports Identify risk conditions and receive a notication if these conditions
occur. Key security data integrates automatically with SIEM solutions. Validate the status of complementary securit y applications such
as encr yption, anti-malware and SCCM. Use these reports to prove to auditors that security measures were properly implemented and in place at the time of a security incident.
Geofencing Create geofences based on organisational policies and receive
analert to investigate devices that are out of bounds or entering an unauthorised location.
2
Loading...
+ 2 hidden pages