3 Essential Actions to Manage and Secure Remote Devices


As an Absolute customer, you understand the importance of securing your devices, apps, and data. But a world of remote work has introduced new challenges. Since the end of March, we've tracked a 43% rise in incidences of sensitive data on endpoints.
You already have the tools at your disposal to manage and secure remote devices — and we’ll show you how to best make use of them.
- How to use Absolute to restrict access to devices and protect sensitive data — within your existing IT processes
- The many uses of Device Freeze, including forcing updates and responding to security threats
- Data protection tips using Device Wipe and Data Delete
- Plus: best practices for optimizing end-of-life workflow with Absolute
You’ll leave this session with practical advice for managing and securing remote endpoints.
As an Absolute customer, you understand the importance of securing your devices, apps, and data. But a world of remote work has introduced new challenges. Since the end of March, we've tracked a 43% rise in incidences of sensitive data on endpoints.
You already have the tools at your disposal to manage and secure remote devices — and we’ll show you how to best make use of them.
- How to use Absolute to restrict access to devices and protect sensitive data — within your existing IT processes
- The many uses of Device Freeze, including forcing updates and responding to security threats
- Data protection tips using Device Wipe and Data Delete
- Plus: best practices for optimizing end-of-life workflow with Absolute
You’ll leave this session with practical advice for managing and securing remote endpoints.
Featured Speakers


Absolute makes managing laptops much safer and easier. We know immediately if a laptop begins to drift off our radar we can send the department manager a message asking them to investigate. If a device is lost or stolen, Absolute is a lifeline.