Encrypted Drive Management Software aids configuration, setup.
February 16, 2011 -
Absolute® Secure Drive is used to manage self-encrypted drives (SEDs) that meet OPAL specifications. With it, IT administrators can configure and set up OPAL SEDs on each computer in their deployment. Then they can administer users, authentication methods, policies, and system maintenance through to end-of-life, all from one unified console. Deployment is possible via integration with existing Active Directory/ADA M, and Novell eDirectory environments.
(Archive News Story - Products mentioned in this Archive News Story may or may not be available from the manufacturer.)
|Original Press release |
Absolute Software Corp.
Suite 800 - 11, Dunsmuir St.
Vancouver, , V6B 6A3
Absolute Software Launches Next-Generation of Encryption with Absolute Secure Drive
Absolute extends data and device protection capabilities with launch of firmware-based self-encrypted drive solution
VANCOUVER - Absolute(R) Software Corporation ("Absolute" or the "Company") (TSX: ABT), specializes in software and services for the security and management of computers and mobile devices. Absolute Software is the leading provider of endpoint security and management solutions that reduce IT costs, prove regulatory compliance, respond to computer theft, and optimize productivity. Today Absolute Software announced the general availability of Absolute Secure Drive to manage self-encrypted drives.
Absolute Secure Drive manages self-encrypted drives (SEDs) that meet OPAL specifications, an industry standard released in early 2009 by the Trusted Computing Group (TCG). With Absolute Secure Drive, IT administrators can easily configure and set up OPAL SEDs on each computer in their deployment. Then they can administer users, authentication methods, policies, and system maintenance through to end-of-life, all from a single unified console.
"Traditional encryption solutions provide inconsistent results, can consume significant IT resources, and negatively impact computer performance. Often the end user represents a point of failure as documents are stored improperly or passwords are not safeguarded," states John Livingston, chairman and chief executive officer at Absolute Software. "Absolute Secure Drive provides organizations with an entirely new level of data and device security. It is another example of how we will continue to increase our lead at the forefront of endpoint security and management."
According to research conducted by the Ponemon Institute, 56% of IT organizations surveyed were unable to prove a laptop was properly encrypted at the time of theft. In addition, 60% of business managers stated they have disengaged their company-provided encryption solution.(1) These powerful statistics reinforce the need for a firmware-based method of encryption, one that removes the end user as a potential point of failure.
(1 )2010 Human Factor in Laptop Encryption: US Study
Live Demo of Absolute Secure Drive at RSA, February 14
Absolute Software will be conducting live demonstrations of Absolute Secure Drive at RSA at Moscone Center South in San Francisco on Monday, Feb 14 at the TCG Seminar Room - Esplanade Ballroom, Room 301/303.
How Computrace Technology Works
Computrace is powered by Absolute Software patented Computrace persistence technology. When embedded in the firmware of computers from leading computer manufacturers, Computrace can survive operating system re-installations, as well as hard-drive reformats, replacements and re-imaging, helping to ensure that the service is there when you need it most.* Whether in a PC or Mac, the software is virtually undetectable and calls home to the Absolute Monitoring Center with asset information including location. If a computer is reported stolen, the Absolute Theft Recovery Team works on behalf of the customer to gather evidence from the computer to identify the thief's location, and then works with local police to get the computer back. Customers can also remotely retrieve files and delete data from devices to help keep it out of the hands of unauthorized users. Computrace can be easily activated by customers when they install a license ranging from 1-3 years.
*For a list of computers with firmware-embedded support, visit www.absolute.com/firmware.
Absolute Secure Drive is generally available now. More information can be obtained by visiting www.absolute.com/sed.
About Absolute Software
Absolute Software Corporation (TSX: ABT) is the leader in tracking, managing and protecting computers and mobile devices. The Company's Computrace, Absolute Manage and LoJack((R)) for Laptops solutions provide theft recovery, data protection and computer lifecycle management capabilities to organizations and consumers. The Company's software agent is embedded in the firmware of computers by global leaders, including Acer, ASUS, Dell, Fujitsu, General Dynamics Itronix, HP, Lenovo, Motion, Panasonic and Toshiba, and the Company has reselling partnerships with these OEMs and others, including Apple. For more information about Absolute Software, visit www.absolute.com and http://blog.absolute.com.
(C)2011 Absolute Software Corporation. All rights reserved. Computrace and Absolute are registered trademarks of Absolute Software Corporation.
LoJack is a registered trademark of LoJack Corporation, used under license by Absolute Software Corporation. LoJack Corporation is not responsible for any content herein. U.S. patents # 5,715,174, # 5,764,892, # 5,802,280, # 5,896,497, # 6,087,937, # 6,244,758, # 6,269,392, # 6,300,863, # 6,507,914, # 7818557, # 7818803.
Canadian patents # 2.211.735, # 2,284,806 and # 2,205,370. U.K. patents # EP793823, # GB2298302 and # GB2338101. German patent # 695 125 34.6-08. Australian patent # 699045. Japanese patent # JP4067035. The Toronto Stock Exchange has neither approved nor disapproved of the information contained in this news release.
Absolute Software Corporation