Absolute Software

Displaying 1-22 of 22 results

  • White Papers // Jul 2013

    Four Reasons to Adjust Your Endpoint GRC Strategy

    With the growing use of tablets, smartphones, and ultrabooks, companies today must support a much wider variety of endpoint devices. And as the population becomes more mobile, there is an increasing overlap between the use of these devices for personal and work life. Most importantly, the data stored on these...

    Provided By Absolute Software

  • White Papers // Jul 2013

    Building The Business Case For a BYOD Program

    This report outlines Forrester's guidance for developing a business case to justify a BYOD program to support your workforce computing strategy. Supporting the growing number and increasing diversity of mobile devices used for work is particularly challenging for I&O executives. Results of Forrester's Forrsights Workforce Employee Survey, Q2 2012 show...

    Provided By Absolute Software

  • White Papers // Jun 2012

    BYOD Policy Implementation Guide

    We won't bore you with the typical overview that speaks to the imminent arrival of BYOD and the advent of employee owned devices on the corporate network. If you're reading this document, you know that BYOD isn't coming, it's already here. The purpose of this guide is to provide...

    Provided By Absolute Software

  • Podcasts // Jun 2012

    Set It & Forget It - Apple Devices in the Enterprise

    Learn how Under Armour performs patch management, provides Mac and iOS device support and creates reports for business critical data.

    Provided By Absolute Software

  • White Papers // Apr 2012

    Intelligent Client-Side Defense for Stolen Computers by Intel and Absolute

    Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of notebooks computers leaves sensitive data vulnerable, while financial and legal exposure causes additional problems and disruptions to business. In addition, companies must comply with increasingly stringent regulations in data...

    Provided By Absolute Software

  • White Papers // Apr 2012

    So Youre Responcible for Managing laptops

    if your organization is like most, you're buying mobile computers to allow for remote and mobile workers - meaning corporate computing is no longer confined to the LaN. Most likely, the tools you have to manage them aren't keeping up with your responsibilities.

    Provided By Absolute Software

  • White Papers // Apr 2012

    Managing Macs in a Windows Environment

    Computer networks are more diverse than ever. A homogeneous environment of only windows or Mac devices is a rarity. Multi-platform computing environments are the norm and require a complex it landscape comprised of multiple applications based on platform, availability, and user preference. Cross-platform environments are the new standard, supported...

    Provided By Absolute Software

  • White Papers // Apr 2012

    Endpoint Security - Data Protection for IT, Freedom for Laptop Users

    a worldwide shift towards the use of mobile devices coupled with recently-enacted data breach legislation has created a new challenge for it organizations: balancing the enhanced productivity of mobile computing with the requirement to protect sensitive information from data breach. Many organizations have tackled mobile computer security with corporate policy,...

    Provided By Absolute Software

  • White Papers // Apr 2012

    IT Asset Security strategy: Healthcare

    along with healthcare, most businesses and organizations recognize the need to define and implement an it asset Security Strategy. every year regulations are tightened, penalties are increased, and public trust is impacted when sensitive data is compromised. in response, organizations are more proactive in their approach to it security than...

    Provided By Absolute Software

  • White Papers // Mar 2012

    Reduce the Risk-and Cost-of Mobility by Securely Managing Your Mobile Devices

    With the country experiencing a sluggish economy, it's harder than ever for schools to come up with the necessary resources. Despite dramatic declines in both state and local funding in most districts, there is still the expectation that they will continue to meet the needs of their students. The Center...

    Provided By Absolute Software

  • White Papers // Mar 2012

    Mobile Devices Everywhere: Healthcare Organizations Need Innovative Technology to Manage & Secure Mobility

    For many years ? generations, in fact, healthcare leaders have been asking for the increased use of information technology in their facilities, especially at the point of care. The problem: The inevitable resistance to change. Many healthcare workers didn't want to jump on the IT bandwagon, preferring to retain their...

    Provided By Absolute Software

  • White Papers // Feb 2012

    Gartner Client Management Tools Magic Quadrant

    Client management tools manage configurations and support system administration tasks for client devices. They are used by desktop support organizations to automate system administration and support functions that would otherwise be done manually. Windows PCs are the primary target of management, but organizations are looking to use these products to...

    Provided By Absolute Software

  • White Papers // Jan 2012

    Gartner Report: Media Tablets and Beyond: The Impact of Mobile Devices on Enterprise Management

    This research assesses the impact of the tremendous growth in media tablets (see Note 1) and other "off desktop" form factors on enterprise IT management best practices. Fundamental changes are afoot that will radically change many of the long-held approaches toward the management of client-side devices.

    Provided By Absolute Software

  • White Papers // Jan 2012

    Aberdeen Report: Endpoint Security and Endpoint Management in the Era of Enterprise Mobility and BYOD: Still Better Together

    Abredeen's analysis confirms that the case for convergence between endpoint security and endpoint management is still very strong in the mobile, Bring Your Own Device era - in particular, the implementation of basic mobile device management correlates with between 3-times and 6-times greater adaptation of capabilities across the entire enterprise...

    Provided By Absolute Software

  • White Papers // Apr 2011

    Forrester Report: Managing the Security and Risk Challenges of Personal Devices in the Workplace

    Amid the rising trend of personally owned smartphone and tablet use in the workplace, security professionals face the tough question of how to properly manage and secure these devices. Secure processes such as remote wipe, pin-based entry, and centralized management will satisfy many of the security requirements of your organization....

    Provided By Absolute Software

  • White Papers // Feb 2010

    The Human Factor In Laptop Encription

    In this study we surveyed 568 IT practitioners and 563 non-IT business managers. An important finding of the study is that there has been virtually no improvement in the practices of non-IT business managers to secure their laptops. Consistent with the earlier study, a high percentage of employees we surveyed...

    Provided By Absolute Software

  • Webcasts // Jan 2010

    InfoSecurity Expert Discusses Safe & Secure Computing at University System of Georgia

    Underlying any campus computing initiative is the goal to provide students with a safe computing environment. Fundamental to this safety is the maintenance of data security - an element enforced by strict regulatory compliance guidelines maintaining such security is not without its challenges. Mobile computers facilitate mobile data and, as...

    Provided By Absolute Software

  • Webcasts // Jan 2010

    Laptop Management and Data Breach Prevention Featuring Allina Hospitals & Clinics

    This webcast will help to understand how IT can track all computers, regardless of their location, and have a plan in place in the event that one is lost or stolen. Using the highly-regulated healthcare industry as an example, Allina Hospitals & Clinics and Lenovo discuss best practices for managing...

    Provided By Absolute Software

  • Webcasts // Jan 2010

    Managing and Protecting Your Ever Increasing Mobile Assets

    Users are becoming more mobile each day. This is great for productivity - yet difficult for IT control. Chances are one understand the challenges of enabling a mobile workforce while maintaining the highest possible level of data security. That's why one should know about solutions that make life easier by...

    Provided By Absolute Software

  • Webcasts // Jan 2010

    Secure and Manage Laptops Off the Network, the Grant Thornton Experience

    The attendee of this webcast will learn best practices for IT asset management that will secure the laptops and mobile devices regardless of where the workforce takes them. At Grant Thornton LLP, the IT Operations department was faced with the daunting task of creating a standardized IT model for 51...

    Provided By Absolute Software

  • White Papers // May 2009

    Endpoint Security: Data Protection for IT, Freedom for Laptop Users

    A worldwide shift towards the use of mobile devices coupled with recently-enacted data breach legislation has created a new challenge for IT organizations: balancing the enhanced productivity of mobile computing with the requirement to protect sensitive information from data breach. Many organizations have tackled mobile computer security with corporate policy,...

    Provided By Absolute Software

  • White Papers // Apr 2009

    PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks

    Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of notebooks computers leaves sensitive data vulnerable, while financial and legal exposure causes additional problems and disruptions to business. In addition, companies must comply with increasingly stringent regulations in data...

    Provided By Absolute Software

  • White Papers // Jul 2013

    Four Reasons to Adjust Your Endpoint GRC Strategy

    With the growing use of tablets, smartphones, and ultrabooks, companies today must support a much wider variety of endpoint devices. And as the population becomes more mobile, there is an increasing overlap between the use of these devices for personal and work life. Most importantly, the data stored on these...

    Provided By Absolute Software

  • White Papers // Jul 2013

    Building The Business Case For a BYOD Program

    This report outlines Forrester's guidance for developing a business case to justify a BYOD program to support your workforce computing strategy. Supporting the growing number and increasing diversity of mobile devices used for work is particularly challenging for I&O executives. Results of Forrester's Forrsights Workforce Employee Survey, Q2 2012 show...

    Provided By Absolute Software

  • White Papers // Feb 2012

    Gartner Client Management Tools Magic Quadrant

    Client management tools manage configurations and support system administration tasks for client devices. They are used by desktop support organizations to automate system administration and support functions that would otherwise be done manually. Windows PCs are the primary target of management, but organizations are looking to use these products to...

    Provided By Absolute Software

  • White Papers // Jan 2012

    Gartner Report: Media Tablets and Beyond: The Impact of Mobile Devices on Enterprise Management

    This research assesses the impact of the tremendous growth in media tablets (see Note 1) and other "off desktop" form factors on enterprise IT management best practices. Fundamental changes are afoot that will radically change many of the long-held approaches toward the management of client-side devices.

    Provided By Absolute Software

  • White Papers // Mar 2012

    Reduce the Risk-and Cost-of Mobility by Securely Managing Your Mobile Devices

    With the country experiencing a sluggish economy, it's harder than ever for schools to come up with the necessary resources. Despite dramatic declines in both state and local funding in most districts, there is still the expectation that they will continue to meet the needs of their students. The Center...

    Provided By Absolute Software

  • White Papers // Jan 2012

    Aberdeen Report: Endpoint Security and Endpoint Management in the Era of Enterprise Mobility and BYOD: Still Better Together

    Abredeen's analysis confirms that the case for convergence between endpoint security and endpoint management is still very strong in the mobile, Bring Your Own Device era - in particular, the implementation of basic mobile device management correlates with between 3-times and 6-times greater adaptation of capabilities across the entire enterprise...

    Provided By Absolute Software

  • White Papers // Mar 2012

    Mobile Devices Everywhere: Healthcare Organizations Need Innovative Technology to Manage & Secure Mobility

    For many years ? generations, in fact, healthcare leaders have been asking for the increased use of information technology in their facilities, especially at the point of care. The problem: The inevitable resistance to change. Many healthcare workers didn't want to jump on the IT bandwagon, preferring to retain their...

    Provided By Absolute Software

  • White Papers // Apr 2012

    Intelligent Client-Side Defense for Stolen Computers by Intel and Absolute

    Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of notebooks computers leaves sensitive data vulnerable, while financial and legal exposure causes additional problems and disruptions to business. In addition, companies must comply with increasingly stringent regulations in data...

    Provided By Absolute Software

  • White Papers // Feb 2010

    The Human Factor In Laptop Encription

    In this study we surveyed 568 IT practitioners and 563 non-IT business managers. An important finding of the study is that there has been virtually no improvement in the practices of non-IT business managers to secure their laptops. Consistent with the earlier study, a high percentage of employees we surveyed...

    Provided By Absolute Software

  • White Papers // Apr 2012

    So Youre Responcible for Managing laptops

    if your organization is like most, you're buying mobile computers to allow for remote and mobile workers - meaning corporate computing is no longer confined to the LaN. Most likely, the tools you have to manage them aren't keeping up with your responsibilities.

    Provided By Absolute Software

  • White Papers // Apr 2012

    Managing Macs in a Windows Environment

    Computer networks are more diverse than ever. A homogeneous environment of only windows or Mac devices is a rarity. Multi-platform computing environments are the norm and require a complex it landscape comprised of multiple applications based on platform, availability, and user preference. Cross-platform environments are the new standard, supported...

    Provided By Absolute Software

  • White Papers // Apr 2012

    Endpoint Security - Data Protection for IT, Freedom for Laptop Users

    a worldwide shift towards the use of mobile devices coupled with recently-enacted data breach legislation has created a new challenge for it organizations: balancing the enhanced productivity of mobile computing with the requirement to protect sensitive information from data breach. Many organizations have tackled mobile computer security with corporate policy,...

    Provided By Absolute Software

  • White Papers // Apr 2012

    IT Asset Security strategy: Healthcare

    along with healthcare, most businesses and organizations recognize the need to define and implement an it asset Security Strategy. every year regulations are tightened, penalties are increased, and public trust is impacted when sensitive data is compromised. in response, organizations are more proactive in their approach to it security than...

    Provided By Absolute Software

  • White Papers // Apr 2011

    Forrester Report: Managing the Security and Risk Challenges of Personal Devices in the Workplace

    Amid the rising trend of personally owned smartphone and tablet use in the workplace, security professionals face the tough question of how to properly manage and secure these devices. Secure processes such as remote wipe, pin-based entry, and centralized management will satisfy many of the security requirements of your organization....

    Provided By Absolute Software

  • White Papers // Jun 2012

    BYOD Policy Implementation Guide

    We won't bore you with the typical overview that speaks to the imminent arrival of BYOD and the advent of employee owned devices on the corporate network. If you're reading this document, you know that BYOD isn't coming, it's already here. The purpose of this guide is to provide...

    Provided By Absolute Software

  • Podcasts // Jun 2012

    Set It & Forget It - Apple Devices in the Enterprise

    Learn how Under Armour performs patch management, provides Mac and iOS device support and creates reports for business critical data.

    Provided By Absolute Software

  • White Papers // May 2009

    Endpoint Security: Data Protection for IT, Freedom for Laptop Users

    A worldwide shift towards the use of mobile devices coupled with recently-enacted data breach legislation has created a new challenge for IT organizations: balancing the enhanced productivity of mobile computing with the requirement to protect sensitive information from data breach. Many organizations have tackled mobile computer security with corporate policy,...

    Provided By Absolute Software

  • White Papers // Apr 2009

    PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks

    Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of notebooks computers leaves sensitive data vulnerable, while financial and legal exposure causes additional problems and disruptions to business. In addition, companies must comply with increasingly stringent regulations in data...

    Provided By Absolute Software

  • Webcasts // Jan 2010

    InfoSecurity Expert Discusses Safe & Secure Computing at University System of Georgia

    Underlying any campus computing initiative is the goal to provide students with a safe computing environment. Fundamental to this safety is the maintenance of data security - an element enforced by strict regulatory compliance guidelines maintaining such security is not without its challenges. Mobile computers facilitate mobile data and, as...

    Provided By Absolute Software

  • Webcasts // Jan 2010

    Laptop Management and Data Breach Prevention Featuring Allina Hospitals & Clinics

    This webcast will help to understand how IT can track all computers, regardless of their location, and have a plan in place in the event that one is lost or stolen. Using the highly-regulated healthcare industry as an example, Allina Hospitals & Clinics and Lenovo discuss best practices for managing...

    Provided By Absolute Software

  • Webcasts // Jan 2010

    Managing and Protecting Your Ever Increasing Mobile Assets

    Users are becoming more mobile each day. This is great for productivity - yet difficult for IT control. Chances are one understand the challenges of enabling a mobile workforce while maintaining the highest possible level of data security. That's why one should know about solutions that make life easier by...

    Provided By Absolute Software

  • Webcasts // Jan 2010

    Secure and Manage Laptops Off the Network, the Grant Thornton Experience

    The attendee of this webcast will learn best practices for IT asset management that will secure the laptops and mobile devices regardless of where the workforce takes them. At Grant Thornton LLP, the IT Operations department was faced with the daunting task of creating a standardized IT model for 51...

    Provided By Absolute Software