Done shopping? You can create a PDF of your cart for later or for your purchasing dept! Details at checkout.
- Reporting and analytics
Collect incredibly accurate and comprehensive information from each device. Use it to satisfy government funding initiatives. Conduct zero-touch hardware inventories extremely fast. Identify events and activities that could be precursors to a security incident including changes to IP address, location, and user; non-compliant software/hardware installations; and many more. Receive a notification if any of these activities occur.
Track assets on a map, including recent and historical locations. Create geofences based on school policies. Investigate devices that are out of bounds or entering an unauthorized location.
- Risk assessment
Identify risk conditions and receive a notification if these conditions occur. Validate the status of complementary security applications such as encryption and anti-malware across all devices. Customize end-user messaging to deliver notifications to students or to communicate with students to validate the security status of a device.
- Risk response
Freeze a device and communicate with the student to verify status. Set policies to ensure offline devices are automatically frozen if they don't connect to the school network within a specified window of time. Remotely recover or delete data from a device. Determine device location and work with the Absolute Investigations team and law enforcement to retrieve it.
Absolute Data and Device Security (DDS) is an adaptive endpoint security solution. It provides you with a persistent connection to all of your endpoints and the data they contain so you can deliver a digital learning experience while promoting a safer school environment and securing your IT assets. With Absolute DDS, it's all about the connection. By maintaining a two-way connection with each device, you have the insight you need to effectively manage your devices and apply remote security measures so you can ensure the safety of your students and protect each endpoint. This valuable insight is delivered through a cloud-based console that requires no additional IT infrastructure.