Absolute Software Consumer Products
Absolute LoJack Logo Absolute Data Protect Logo

Absolute Computrace / Features & Benefits

Absolute Computrace provides organizations with comprehensive control and visibility over the devices in their deployment, while allowing them to persistently secure all endpoints from a single cloud-based console. Learn more about features of persistence-based security solutions from Absolute.

Absolute Computrace Feature Matrix

Absolute Computrace Feature MatrixThis is a detailed feature overview of Computrace products that provide endpoint security for desktop and laptop computers.

Absolute Computrace Mobile Feature Matrix

Absolute Computrace Mobile Feature MatrixThis is a detailed feature overview of Computrace products that provide endpoint security for ultra-portable devices such as netbooks, tablets, and smartphones.

Absolute Computrace Asset Administration Icon

Asset Administration

Using a cloud-based interface, customers can manage their entire deployment (desktops, laptops, ultra-portable devices) regardless if the device is on or off the network.

  • Collect incredibly accurate and comprehensive information from each device
  • Create customized policies and alerts to be notified when a change is detected
  • Asset information includes user identification, physical location, hardware and software, antivirus and encryption status, and hundreds of other data points
Absolute Computrace Data & Device Security Icon

Data & Device Security

If the device is not secure, then the data it contains is at risk. Absolute Computrace allows IT to remotely engage with the device so that data can be safeguarded or removed:

  • Remotely delete sensitive data on computers at risk
  • Produce an audit log of the deleted files to prove compliance
  • Freeze a device and send a message to the user - even if the device is offline
  • Remotely retrieve files from a device regardless of user or location
  • Monitor the status of encryption on each endpoint
Absolute Computrace Geotechnology Icon


The physical location of a device can often predict if it is secure or at risk, so knowing where it is (and where it’s been) can be an important factor within your GRC policy:

  • Track assets on an internet map including current and historical locations
  • Build geofences and receive an alert if a device strays
  • Investigate and determine device status based on its physical location
Absolute Computrace Digital Forensics Icon

Endpoint Forensics

The ability to understand why and how something happened is critical, especially when proving chain of custody or when criminal activity is suspected. The Absolute Investigations Team can:

  • Forensically mine a stolen computer regardless of location
  • Use key captures, registry and file scanning, geolocation, and other investigative techniques to understand how and why a device was breached
  • Determine who has the device, what they’re doing with it, and whether any data was accessed
  • Learn more about our additional customized services