Endpoint Security

How Under Armour Secures Mobile Devices

February 24, 2014

Under Armour is a leading developer, marketer, and distributor of branded performance apparel, footwear, and accessories. The company’s products are sold worldwide and worn by athletes at all levels, from youth to professional, on playing fields around the globe. In our  customer video, Ben Snyder, Desktop Support Analyst at Under Armour, discusses how the global athletic brand uses both Absolute to secure their devices and data.

In the last four years, the number of Mac computers at Under Armour has quadrupled. This increase in Apple devices proved problematic for IT since existing tools were unable to secure Mac computers with the same breadth and accuracy as their PC counterparts. Under Armour uses Absolute to track and secure their mobile devices to protect the company's data and safeguard their intellectual property. A key feature for Under Armour is our Persistence technology, which gives them the protection for their intellectual property when a corporate laptop inevitably gets left in a hotel or taxi.

Watch the customer video with Under Armour here.

Endpoint Security

Share this article

Financial Services