Hewlett Packard U9BB2E Getting Started Guide

Data sheet
HP Computrace Support Service
HP Care Pack services
Service benets
Risk assessment
This service enables you to monitor device activity and status, and receive alerts if pre-
dened conditions occur. Examples include
non-compliant device location, the status of complementary security technologies such as encryption and anti-malware, o-line device control, blacklisted applications, rogue employees and so on.
Lifecycle security
The service will apply a layer of security across the entire lifecycle of each device and receive
alerts if pre-dened conditions occur. Examples
include securing new devices in transit and validating end users, hardware/software
inventories, blacklisted applications, certied
end-of-life data delete protocols and so on.
Risk response
You can invoke security commands and other
measures remotely to avoid a signicant security incident. Examples include end-user messaging, locking a device until its status is conrmed, denitive proof that endpoint data and corporate
networks were not accessed while a device was at risk, remote retrieval and deletion of endpoint data, chain of custody, internal investigations and so on.
Service overview
The strategic global relationship of Absolute Software and HP Care Pack services provides HP customers with world-class hardware technology and endpoint security and management for their devices.
Absolute Software is the industry standard in persistent endpoint security and management for computers, laptops, tablets and smartphones – and the data they contain. Absolute Software, a leader in device security and management tracking for more than 20 years, has over 30,000 commercial customers worldwide. Absolute Computrace provides organisations with actionable intelligence to prove compliance and deliver comprehensive visibility and control over all of their devices and data, anywhere, anytime.
HP oers multiple service levels of Computrace products to meet your business needs. Not all service levels are available in all countries and regions.
Table 1. Computrace products and features
Asset
administration
Computrace Complete
Computrace One
Computrace Data Protection
1
Basic* Computrace
Data Protection Computrace
Mobile Basic** Computrace
Mobile Standard Computrace
Absolute Track
Computrace Mobile Theft Management
1
Standard** Computrace
Mobile Theft Management
1
Premium**
* Computrace Data Protection Basic is available only on the following products: HP ProBook 11 EE, H P Pro Tablet 10
EE and HP Pro Slate 10 EE. For f urther information, contac t: HPSchoolPack@absolute.com
** Computr ace Mobile Th eft Management Standard and Premium are ser vices available for North Americ a education
customers, and only on Chromebook, iPad and iPad mini products.
*** The optional subscription serv ice of Absolute Recovery Guarantee is a limited warranty.
Cert ain conditions apply. For full det ails visit: absolute.com/company/legal/agreements/computrace-agreement. If Data D elete is utilised, t he Recovery Guarantee payment is nul l and void. In order to use the Data Delete service,
customers must rst sign a Pre-Autho risation Agreement and either create a P IN or purchase one or more RSA
SecurID tokens from Absolute Software.
For additional information, contact: absolute.com/en/support/absolute-computrace
Data an d
device security Geotechnology
2
2
Endpoint forensics
Thef t
recovery
3
3
3
***
Serv ice
guarantee
1
Does not include software asset reporting
2
Does not provide geo-fencing capabilities
3
Provides basic theft recovery services only
Data sheet | HP Co mputrace Suppor t Service
Persistence technology
HP devices have Persistence technology embedded in their rmware. Once activated,
Persistence triggers an automated re-installation process if the software client is removed
from a device. The software client re-installs even if the rmware is ashed, the device is
re-imaged, the hard drive is replaced, or a tablet or smartphone is wiped clean to its factory settings. No other technology can do this. This level of persistence provides HP customers with the means to secure each device and the sensitive data it contains – and, in the event of theft, to recover the device. For a complete listing of HP devices with Persistence technology embedded in the rmware, visit: absolute.com/hp
Specications
Table 2. Service features
Feature Delivery specications
Capability overview Depending on the HP Computrace Support Service purchased, the following
features may apply:
Asset administration Using a cloud-based interface, customers can manage their entire
deployment (desktops, laptops and ultra-portable devices) whether
the devices are on or o the network. With this feature, users can:
• Collect incredibly accurate and comprehensive information from each device
Create customised policies and alerts to receive notication when a change is detected
Asset information includes user identication, physical location, hardware and software, antivirus and encryption status, and hundreds of other datapoints.
Data and device security If the device is not secure, then the data it contains is at risk. Absolute
Computrace allows IT to remotely engage with the device so that data can be safeguarded or removed:
• Remotely delete sensitive data on at-risk computers
Produce an audit log of the deleted les to prove compliance
• Freeze a device and send a message to the user – even if the device
is o line
Remotely retrieve les from a device regardless of user or location
• Monitor the status of encryption on each endpoint
Geotechnology The physical location of a device can often predict if it is secure or at risk,
so knowing where it is (and where it’s been) can be an important factor within a governance, risk management and compliance (GRC) policy:
• Track assets on an Internet map, including current and historical locations
• Build geo-fences and receive an alert if a device strays from this space
• Investigate and determine a device’s status based on its physical location
Endpoint forensics The ability to understand why and how something happened is critical,
especially when proving chain of custody or when criminal activity is suspected. The Absolute Investigations team can:
• Forensically mine a stolen computer regardless of its location
Use key captures, registry and le scanning, geo-location and other investigative techniques to understand how and why a device was breached
• Determine who has the device, what they’re doing with it and whether any data was accessed
Theft recovery At an HP customer’s request, the Absolute Investigations and Recovery
Services team will work closely with local police to recover a stolen device.
We successfully recover thousands of devices each year.
Service Guarantee
A Service Guarantee is a warranty, not an insurance policy. The Ser vice Guarantee period will commence on the theft report date and will end after 60 days. Providing customers meet all eligibility criteria, they will receive an email including a Submission Form after the Service Guarantee period. This form, along with any other requested documentation, must be returned to Absolute Software and payment made within 30 days of receipt.
For more information, visit: absolute.com/service-guarantee
22
Loading...
+ 2 hidden pages