Your Cart Is Empty

Continue Shopping

  • Usa Flag 25 Years of Trust
  • |
  • Service Disabled Veteran Owned Small Business

Get Amazing Deals! Learn More

Absolute Data & Device Security Premium For ISA - subscription license (30 months) - 1 device - Win, Mac, Android

Price: $83.47

Save

Item#:
DDSPRM-GD-ISA-30
MFG#:
DDSPRM-GD-ISA-30

  • Endpoint investigations
  • Reporting and analytics
  • Geotechnology

Availability: Discontinued - No Refund | No Returns
Ships Contact Support for Replacement or Alternate Product
notify me
SUPER SERVER SALE

You May Also Need

NETGEAR Web Threat Management Subscription license (1 year) - 1 device - for ProSecure Web and Email Threat Management Appliance STM150

NETGEAR Web Threat Management Subscription license (1 year) - 1 device - for ProSecure Web and Email Threat Management Appliance STM150

NETGEAR Email Threat Management Subscription license (1 year) - 1 device - for ProSecure Web and Email Threat Management Appliance STM150

NETGEAR Email Threat Management Subscription license (1 year) - 1 device - for ProSecure Web and Email Threat Management Appliance STM150

NETGEAR Email Threat Management Subscription license (1 year) - for ProSecure Unified Threat Management Appliance UTM10

NETGEAR Email Threat Management Subscription license (1 year) - for ProSecure Unified Threat Management Appliance UTM10

NETGEAR Extended service agreement - replacement - 1 year - for ProSecure Unified Threat Management Appliance UTM5

NETGEAR Extended service agreement - replacement - 1 year - for ProSecure Unified Threat Management Appliance UTM5

Description

Absolute Data & Device Security Premium - For ISA - subscription license (30 months) - 1 device - Win, Mac, Android.

Important Information

  • Risk assessment
    Identify risk conditions and receive a notification if these conditions occur. Key security data integrates automatically with SIEM solutions. Validate the status of complementary security applications such as encryption, anti-malware, and SCCM. Use these reports to prove to auditors that security measures were properly implemented and in place at the time of a security incident.
  • Risk response
    Remotely recover or delete data. Set policies to ensure offline devices are automatically protected. Freeze a device and communicate with the user to verify status. Produce an audit log to prove data on a compromised device was properly secured, not accessed, and safely deleted. Use certified data delete workflows to decommission a device.
  • Endpoint investigations
    Leverage the Absolute Investigations team to determine the cause of an endpoint security incident. Identify and eliminate insider threats. Refine best practices so the same incident does not reoccur. Determine if data was accessed during an incident, and whether or not a data breach notification is required. Recover stolen devices.
  • Reporting and analytics
    Collect incredibly accurate information from each device, including historical data. Determine what's installed on a device. Identify events and activities that could be precursors to a security incident including changes to IP address, location, and user; non-compliant software/ hardware installations; and many more. Receive a notification if these activities occur.
  • Geotechnology
    Track assets on a Google Map, including recent and historical locations. Create geofences based on corporate policies. Investigate devices that are out of bounds or entering an unauthorized location.

Specifications