Data sheet
HP Computrace Support Service
HP Care Pack services
Service benets
Risk assessment
This service enables you to monitor device
activity and status, and receive alerts if pre-
dened conditions occur. Examples include
non-compliant device location, the status of
complementary security technologies such as
encryption and anti-malware, o-line device
control, blacklisted applications, rogue
employees and so on.
Lifecycle security
The service will apply a layer of security across
the entire lifecycle of each device and receive
alerts if pre-dened conditions occur. Examples
include securing new devices in transit and
validating end users, hardware/software
inventories, blacklisted applications, certied
end-of-life data delete protocols and so on.
Risk response
You can invoke security commands and other
measures remotely to avoid a signicant security
incident. Examples include end-user messaging,
locking a device until its status is conrmed,
denitive proof that endpoint data and corporate
networks were not accessed while a device was
at risk, remote retrieval and deletion of endpoint
data, chain of custody, internal investigations
and so on.
Service overview
The strategic global relationship of Absolute Software and HP Care Pack services provides
HP customers with world-class hardware technology and endpoint security and
management for their devices.
Absolute Software is the industry standard in persistent endpoint security and management
for computers, laptops, tablets and smartphones – and the data they contain. Absolute
Software, a leader in device security and management tracking for more than 20 years, has
over 30,000 commercial customers worldwide. Absolute Computrace provides organisations
with actionable intelligence to prove compliance and deliver comprehensive visibility and
control over all of their devices and data, anywhere, anytime.
HP oers multiple service levels of Computrace products to meet your business needs.
Not all service levels are available in all countries and regions.
Table 1. Computrace products and features
Asset
administration
Computrace
Complete
Computrace
One
Computrace
Data Protection
• • • • • •
• • • • •
1
•
Basic*
Computrace
Data Protection
Computrace
Mobile Basic**
Computrace
Mobile Standard
Computrace
Absolute Track
• • •
• • •
• • • • •
• •
Computrace
Mobile Theft
Management
1
•
Standard**
Computrace
Mobile Theft
Management
1
•
Premium**
* Computrace Data Protection Basic is available only on the following products: HP ProBook 11 EE, H P Pro Tablet 10
EE and HP Pro Slate 10 EE. For f urther information, contac t: HPSchoolPack@absolute.com
** Computr ace Mobile Th eft Management Standard and Premium are ser vices available for North Americ a education
customers, and only on Chromebook, iPad and iPad mini products.
*** The optional subscription serv ice of Absolute Recovery Guarantee is a limited warranty.
Cert ain conditions apply. For full det ails visit: absolute.com/company/legal/agreements/computrace-agreement.
If Data D elete is utilised, t he Recovery Guarantee payment is nul l and void. In order to use the Data Delete service,
customers must rst sign a Pre-Autho risation Agreement and either create a P IN or purchase one or more RSA
SecurID tokens from Absolute Software.
For additional information, contact: absolute.com/en/support/absolute-computrace
Data an d
device security Geotechnology
•
2
2
Endpoint
forensics
• •
• •
Thef t
recovery
3
3
3
***
Serv ice
guarantee
•
1
Does not include software asset reporting
2
Does not provide geo-fencing capabilities
3
Provides basic theft recovery services only
Data sheet | HP Co mputrace Suppor t Service
Persistence technology
HP devices have Persistence technology embedded in their rmware. Once activated,
Persistence triggers an automated re-installation process if the software client is removed
from a device. The software client re-installs even if the rmware is ashed, the device is
re-imaged, the hard drive is replaced, or a tablet or smartphone is wiped clean to its factory
settings. No other technology can do this. This level of persistence provides HP customers
with the means to secure each device and the sensitive data it contains – and, in the event of
theft, to recover the device. For a complete listing of HP devices with Persistence technology
embedded in the rmware, visit: absolute.com/hp
Specications
Table 2. Service features
Feature Delivery specications
Capability overview Depending on the HP Computrace Support Service purchased, the following
features may apply:
Asset administration Using a cloud-based interface, customers can manage their entire
deployment (desktops, laptops and ultra-portable devices) whether
the devices are on or o the network. With this feature, users can:
• Collect incredibly accurate and comprehensive information from
each device
• Create customised policies and alerts to receive notication when
a change is detected
Asset information includes user identication, physical location,
hardware and software, antivirus and encryption status, and
hundreds of other datapoints.
Data and device security If the device is not secure, then the data it contains is at risk. Absolute
Computrace allows IT to remotely engage with the device so that data
can be safeguarded or removed:
• Remotely delete sensitive data on at-risk computers
• Produce an audit log of the deleted les to prove compliance
• Freeze a device and send a message to the user – even if the device
is o line
• Remotely retrieve les from a device regardless of user or location
• Monitor the status of encryption on each endpoint
Geotechnology The physical location of a device can often predict if it is secure or at risk,
so knowing where it is (and where it’s been) can be an important factor
within a governance, risk management and compliance (GRC) policy:
• Track assets on an Internet map, including current and historical locations
• Build geo-fences and receive an alert if a device strays from this space
• Investigate and determine a device’s status based on its physical location
Endpoint forensics The ability to understand why and how something happened is critical,
especially when proving chain of custody or when criminal activity is
suspected. The Absolute Investigations team can:
• Forensically mine a stolen computer regardless of its location
• Use key captures, registry and le scanning, geo-location and other
investigative techniques to understand how and why a device
was breached
• Determine who has the device, what they’re doing with it and whether any
data was accessed
Theft recovery At an HP customer’s request, the Absolute Investigations and Recovery
Services team will work closely with local police to recover a stolen device.
We successfully recover thousands of devices each year.
Service Guarantee
A Service Guarantee is a warranty, not an insurance policy. The Ser vice
Guarantee period will commence on the theft report date and will end after
60 days. Providing customers meet all eligibility criteria, they will receive an
email including a Submission Form after the Service Guarantee period. This
form, along with any other requested documentation, must be returned to
Absolute Software and payment made within 30 days of receipt.
For more information, visit: absolute.com/service-guarantee
22