Absolute Computrace Launches Tailored Breach Response Capabilities

By: Absolute Editorial Team | 7/30/2014

Absolute Software today has launched proactive event-specific response capabilities for data and device security. Event Calling, available with Absolute Compturace, allows for a tailored response to potential data breaches and security incidents. Event Calling provides our customers with a policy-based approach to regulatory compliance, risk management, and enterprise security.

What is Event Calling?

Event Calling, available in Absolute Compturace, allows customers to receive immediate alerts if an event they consider to be significant occurs. Absolute customers can design thousands of different conditions to trigger an alert, allowing them to tailor their security protocols to address the unique needs of their business. Some examples of conditions include if the device hardware or software is altered, if a device connects to a different network, changes location, or if a different user logs on to the device.

Event Calling is particularly relevant to organizations that must adhere to strict data security regulations such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare and broader reaching regulatory requirements such as Sarbanes Oxley, the Gramm-Leach-Bliley Act of 1999, and others.

Organizations bound by these regulations have strict policies in place to control corporate devices and the data they contain. If an unauthorized action or status occurs – for example if a device moves outside of a geographical location – it can be a prelude to a more serious security event. Event Calling will warn IT when a notable change occurs on the endpoint using a level of priority that is set by the customer. This early warning will allow IT to take proactive security measures using Computrace to remotely track, freeze, delete data, or recover data from the device.

Computrace allows organizations to persistently track and secure all of their endpoints within a single cloud-based console. Computers, tablets and smartphones can be remotely managed and secured (on or off the network) to ensure—and most importantly prove—that endpoint IT compliance processes are properly implemented and enforced.

Event Calling is available today for desktop and laptop computers. For more about Event Calling, watch our Ask Absolute video here.

Financial Services