SlideShare a Scribd company logo
Taking Control
of Our Environment
Enhancing Data Security
Sebastien Roques
UK Sales and Strategic Alliance Manager.
Absolute Software
• Vancouver, B.C. headquartered
• Founded in 1993; publicly traded since 2000
• Global leader in firmware-based security solutions
• Strategic partnerships with leading device OEMs
Specializing in management and security solutions for
computers and mobile devices
3
•Computrace “BIOS
Persistence” agent built in.
•Checks on software
•If HDD is low-level formatted,
OS is re-installed, even HDD
removed and replaced, BIOS
agent re-installs!
Computrace Persistence
For a full list of firmware compatibility, please visit:
http://www.absolute.com/en-GB/partners/bios-compatibility
4
Absolute Computrace for Endpoint Security
Computers and ultra-portable devices can be remotely managed and secured to
ensure – and most importantly prove – that endpoint IT compliance processes
are properly implemented and enforced.
Absolute Computrace allows organizations to centrally track and secure all of
their endpoints within a single cloud-based console.
Computrace provides
foundational support for all
activities related to Governance,
Risk Management, and
Compliance (GRC) for the
endpoint.
The Computrace Agent is automatically installed so that IT Administrators can track, manage, and
secure all devices regardless of user or location
Biggest Data Breaches since 2004
6
7
Mobility is Accelerating Data Breaches
“Coca-Cola laptop theft could have compromised
info for 74,000.” – Jan 27 Jan 2014
“Laptop stolen with health information of 620,000
Albertans.” – 22 Jan 2014
“Unencrypted Laptops Lead to Mega-Breach - Horizon
Blue Cross Blue Shield Reveals Incident.”– 9 Dec 2013
“Laptop thefts compromise 729,000 hospital patient
files at AHMC Healthcare.” – 21 Oct 2013
7
GRC for the Endpoint
Computrace provides foundational support for all activities
related to GRC for the endpoint including:
• Proactive alerts on predefined conditions
• Data security & protection
• Deployment & licensing audits
• BYOD policy enforcement
• Theft & criminal investigations
• Security incident response & remediation
• Computer forensics
• Compliance reports & certificates
• End-of-life protocols
• 12 months of device history
8
Endpoint GRC Risk Factors
• The endpoint represents a significant point of risk relative to GRC
– Non-Compliance
• Software license agreements
• Blacklisted programs
• Government and vertically-specific regulatory bodies
• End-of-life protocols
– Data Security
• Unauthorized user access
• Industrial espionage
• Intellectual property
• Encryption failure
• Personally identifiable information
– Employee Misconduct
• Dishonest or criminal activities by employees
• Non-compliant behavior
• Endpoint-specific GRC protocols can be implemented to mitigate the risk
9
Absolute Computrace – Feature Categories
Asset Administration
Collect incredibly accurate and comprehensive information from each device.
Then create customized policies and alerts to be notified as soon as an
unauthorized change is detected.
Data & Device Security
Remotely delete sensitive data on missing computers including an audit log of
the deleted files to prove the data was removed from the device. Freeze a
device with a custom message to the user. Access and retrieve files regardless
of location.
Geotechnology
Track assets on an internet map including current and historical locations. Build
geofences to contain a device and receive an alert if it strays. If a device is not
where it should be, investigate and determine if further action is required.
Absolute Computrace – Feature Categories
Computer Forensics
The Absolute Investigations & Recovery team can forensically mine a stolen
computer over the internet using key captures, registry and file scanning,
geolocation, and other investigative techniques to determine who has the
computer and what they’re doing with it, including whether any data was
accessed post-theft.
Theft Recovery
At our customer’s request, the Absolute Investigations & Recovery team will
work closely with local police to recover a stolen device. We successfully
recover thousands of devices each year.
Geotechnology
• Geolocation – GPS & Wi-Fi
• Geofencing
GRC for the Endpoint with Computrace
GRC provides an organization with the infrastructure to create rules, oversee
the application of the rules, provisioning of tools to take action to stay within the
rules, and finally the data to prove that they followed the rules and are indeed
compliant.
Governance = Infrastructure = Customer Center
Management of the process to monitor, direct, and control
Risk Management = Tools = Computrace Features
Management of the process to monitor, direct, and control
Compliance= Data = Computrace Data & Reports
Conform to internal and external regulations, must be provable
13
GRC Infrastructure: Customer Center
• Use Customer Center to identify activity or
device status deemed suspicious
• Receive alerts if any of these conditions occur
for proactive response times
• Computrace data flags potential
non-compliance:
14
Governance = Infrastructure = Customer Center
Management of the process to monitor, direct, and control
GRC Tools: Computrace Features
Risk Management = Tools = Computrace Features
Management of the process to monitor, direct, and control
• Track software
licenses
• Receive alerts to be
notified about
suspicious behavior
• Remotely recover or
delete data from a device
• Freeze a device to block
access
• Remove all data from a
device at end-of-life
• technology to brick or
lock a device
• Track the location of a
device
• Use geofences to
monitor device
movement
• Investigate and recover
stolen devices
• Initiate an investigation to
determine why a security
incident occurred and
prevent it from happening
again
• Investigate suspicious
employee behavior
• Identify security holes
• Prevent incidents from
happening again
GRC Data: Computrace Device Data
• Use Computrace data to prove compliance with corporate and
government regulations:
– Software license compliance report for contract negotiations and audits
– Encryption status report to show which devices were properly protected
with encryption
– End-of-Life data delete certificate
– Data delete audit log
– Proof if data was accessed post-incident
Compliance= Data = Computrace Data & Reports
Conform to internal and external regulations, must be provable
16
Distributors
Resellers
OEMs
Alliances In-Country
Partner Ecosystem
1.800.268.7638 www.soft
Partner Ecosystem
17
Global Samsung Partnership
18
Customer Evangelism
19

More Related Content

PPT
Absolute Software Governance-Risk-Compliance
PPTX
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
PPTX
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
DOC
PPTX
SORT OUT YOUR SIEM
PDF
Siem Overview 2009
PPTX
"Backoff" Malware: How to Know If You're Infected
PDF
KnightSentry 2.0 One Pager: Proprietary Security System Health Monitoring
Absolute Software Governance-Risk-Compliance
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
SORT OUT YOUR SIEM
Siem Overview 2009
"Backoff" Malware: How to Know If You're Infected
KnightSentry 2.0 One Pager: Proprietary Security System Health Monitoring

What's hot (19)

PPTX
199 baseline security
PPTX
Vendor Landscape: Security Information and Event Management
PPTX
Siem solutions R&E
PPTX
Jaxxon consulting presentation
PPTX
SCADA Security Webinar
PPTX
Acculink systems end user presentation
PDF
ICS Network Security Monitoring (NSM)
PPTX
Algo sec suite overview 2013 05
PPTX
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
PPTX
DTS Services
PDF
Nagios Conference 2014 - Jorge Higueros - SNAPS
PPTX
The Benefits of Having Nerds On Site Monitoring Your Technology
PPTX
Acculink systems end user presentation
PDF
SIEM enabled risk management , SOC and GRC v1.0
PPT
Network Configuration and Audit Simplified
PDF
Monitoring ICS Communications
PPT
NIST 800-92 Log Management Guide in the Real World
PPTX
SIEM (Security Information and Event Management)
199 baseline security
Vendor Landscape: Security Information and Event Management
Siem solutions R&E
Jaxxon consulting presentation
SCADA Security Webinar
Acculink systems end user presentation
ICS Network Security Monitoring (NSM)
Algo sec suite overview 2013 05
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
DTS Services
Nagios Conference 2014 - Jorge Higueros - SNAPS
The Benefits of Having Nerds On Site Monitoring Your Technology
Acculink systems end user presentation
SIEM enabled risk management , SOC and GRC v1.0
Network Configuration and Audit Simplified
Monitoring ICS Communications
NIST 800-92 Log Management Guide in the Real World
SIEM (Security Information and Event Management)
Ad

Viewers also liked (6)

PPTX
Deploy automático em projeto PHP - PHPSPIMA 2016
PPTX
Intro to NuGet
PPTX
Understanding NuGet implementation for Enterprises
PPTX
Developing NuGet
PPTX
Design Thinking em Projetos de Engenharia de Software
PDF
Especificação de Requisitos de Software
Deploy automático em projeto PHP - PHPSPIMA 2016
Intro to NuGet
Understanding NuGet implementation for Enterprises
Developing NuGet
Design Thinking em Projetos de Engenharia de Software
Especificação de Requisitos de Software
Ad

Similar to Computrace grc (20)

PPT
Absolute grc-
PDF
Computrace Laptop Security Solutions
PPT
Refense Security Risk Briefing July 2009
PDF
Absolute Software 2008 Annual Report
PDF
Absolute software-for-healthcare
PDF
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
PDF
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PDF
The CISO Problems Risk Compliance Management in a Software Development 030420...
ODP
Cyber Security for Financial Institutions
PPT
NAC Solution Taarak
PPTX
Leveraging Compliance to “Help” Prevent a Future Breach
PDF
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
PPTX
Assessment and Threats: Protecting Your Company from Cyber Attacks
PDF
How to Establish a Cyber Security Readiness Program
PPTX
CSO CXO Series Breakfast
PDF
IDC Best Practices in Private Sector Cyber Security
PPTX
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
PDF
SecureGRC: Unification of Security Monitoring and IT-GRC
PDF
SecureGRC: Unification of Security Monitoring and IT-GRC
Absolute grc-
Computrace Laptop Security Solutions
Refense Security Risk Briefing July 2009
Absolute Software 2008 Annual Report
Absolute software-for-healthcare
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
The CISO Problems Risk Compliance Management in a Software Development 030420...
Cyber Security for Financial Institutions
NAC Solution Taarak
Leveraging Compliance to “Help” Prevent a Future Breach
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
Assessment and Threats: Protecting Your Company from Cyber Attacks
How to Establish a Cyber Security Readiness Program
CSO CXO Series Breakfast
IDC Best Practices in Private Sector Cyber Security
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC

Recently uploaded (20)

PDF
_Nature and dynamics of communities and community development .pdf
PPTX
Tablets And Capsule Preformulation Of Paracetamol
PPTX
Impressionism_PostImpressionism_Presentation.pptx
PPTX
MERISTEMATIC TISSUES (MERISTEMS) PPT PUBLIC
PPTX
Hydrogel Based delivery Cancer Treatment
PPTX
Anesthesia and it's stage with mnemonic and images
PPT
First Aid Training Presentation Slides.ppt
PPTX
NORMAN_RESEARCH_PRESENTATION.in education
PDF
Presentation1 [Autosaved].pdf diagnosiss
PDF
Microsoft-365-Administrator-s-Guide_.pdf
PDF
COLEAD A2F approach and Theory of Change
PDF
PM Narendra Modi's speech from Red Fort on 79th Independence Day.pdf
PPTX
chapter8-180915055454bycuufucdghrwtrt.pptx
PPTX
Sustainable Forest Management ..SFM.pptx
PPTX
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
PPTX
2025-08-17 Joseph 03 (shared slides).pptx
PPTX
3RD-Q 2022_EMPLOYEE RELATION - Copy.pptx
PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
PPTX
lesson6-211001025531lesson plan ppt.pptx
PPTX
Human Mind & its character Characteristics
_Nature and dynamics of communities and community development .pdf
Tablets And Capsule Preformulation Of Paracetamol
Impressionism_PostImpressionism_Presentation.pptx
MERISTEMATIC TISSUES (MERISTEMS) PPT PUBLIC
Hydrogel Based delivery Cancer Treatment
Anesthesia and it's stage with mnemonic and images
First Aid Training Presentation Slides.ppt
NORMAN_RESEARCH_PRESENTATION.in education
Presentation1 [Autosaved].pdf diagnosiss
Microsoft-365-Administrator-s-Guide_.pdf
COLEAD A2F approach and Theory of Change
PM Narendra Modi's speech from Red Fort on 79th Independence Day.pdf
chapter8-180915055454bycuufucdghrwtrt.pptx
Sustainable Forest Management ..SFM.pptx
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
2025-08-17 Joseph 03 (shared slides).pptx
3RD-Q 2022_EMPLOYEE RELATION - Copy.pptx
_ISO_Presentation_ISO 9001 and 45001.pptx
lesson6-211001025531lesson plan ppt.pptx
Human Mind & its character Characteristics

Computrace grc

  • 1. Taking Control of Our Environment Enhancing Data Security Sebastien Roques UK Sales and Strategic Alliance Manager.
  • 2. Absolute Software • Vancouver, B.C. headquartered • Founded in 1993; publicly traded since 2000 • Global leader in firmware-based security solutions • Strategic partnerships with leading device OEMs Specializing in management and security solutions for computers and mobile devices
  • 3. 3 •Computrace “BIOS Persistence” agent built in. •Checks on software •If HDD is low-level formatted, OS is re-installed, even HDD removed and replaced, BIOS agent re-installs! Computrace Persistence For a full list of firmware compatibility, please visit: http://www.absolute.com/en-GB/partners/bios-compatibility
  • 4. 4
  • 5. Absolute Computrace for Endpoint Security Computers and ultra-portable devices can be remotely managed and secured to ensure – and most importantly prove – that endpoint IT compliance processes are properly implemented and enforced. Absolute Computrace allows organizations to centrally track and secure all of their endpoints within a single cloud-based console. Computrace provides foundational support for all activities related to Governance, Risk Management, and Compliance (GRC) for the endpoint. The Computrace Agent is automatically installed so that IT Administrators can track, manage, and secure all devices regardless of user or location
  • 6. Biggest Data Breaches since 2004 6
  • 7. 7 Mobility is Accelerating Data Breaches “Coca-Cola laptop theft could have compromised info for 74,000.” – Jan 27 Jan 2014 “Laptop stolen with health information of 620,000 Albertans.” – 22 Jan 2014 “Unencrypted Laptops Lead to Mega-Breach - Horizon Blue Cross Blue Shield Reveals Incident.”– 9 Dec 2013 “Laptop thefts compromise 729,000 hospital patient files at AHMC Healthcare.” – 21 Oct 2013 7
  • 8. GRC for the Endpoint Computrace provides foundational support for all activities related to GRC for the endpoint including: • Proactive alerts on predefined conditions • Data security & protection • Deployment & licensing audits • BYOD policy enforcement • Theft & criminal investigations • Security incident response & remediation • Computer forensics • Compliance reports & certificates • End-of-life protocols • 12 months of device history 8
  • 9. Endpoint GRC Risk Factors • The endpoint represents a significant point of risk relative to GRC – Non-Compliance • Software license agreements • Blacklisted programs • Government and vertically-specific regulatory bodies • End-of-life protocols – Data Security • Unauthorized user access • Industrial espionage • Intellectual property • Encryption failure • Personally identifiable information – Employee Misconduct • Dishonest or criminal activities by employees • Non-compliant behavior • Endpoint-specific GRC protocols can be implemented to mitigate the risk 9
  • 10. Absolute Computrace – Feature Categories Asset Administration Collect incredibly accurate and comprehensive information from each device. Then create customized policies and alerts to be notified as soon as an unauthorized change is detected. Data & Device Security Remotely delete sensitive data on missing computers including an audit log of the deleted files to prove the data was removed from the device. Freeze a device with a custom message to the user. Access and retrieve files regardless of location. Geotechnology Track assets on an internet map including current and historical locations. Build geofences to contain a device and receive an alert if it strays. If a device is not where it should be, investigate and determine if further action is required.
  • 11. Absolute Computrace – Feature Categories Computer Forensics The Absolute Investigations & Recovery team can forensically mine a stolen computer over the internet using key captures, registry and file scanning, geolocation, and other investigative techniques to determine who has the computer and what they’re doing with it, including whether any data was accessed post-theft. Theft Recovery At our customer’s request, the Absolute Investigations & Recovery team will work closely with local police to recover a stolen device. We successfully recover thousands of devices each year.
  • 12. Geotechnology • Geolocation – GPS & Wi-Fi • Geofencing
  • 13. GRC for the Endpoint with Computrace GRC provides an organization with the infrastructure to create rules, oversee the application of the rules, provisioning of tools to take action to stay within the rules, and finally the data to prove that they followed the rules and are indeed compliant. Governance = Infrastructure = Customer Center Management of the process to monitor, direct, and control Risk Management = Tools = Computrace Features Management of the process to monitor, direct, and control Compliance= Data = Computrace Data & Reports Conform to internal and external regulations, must be provable 13
  • 14. GRC Infrastructure: Customer Center • Use Customer Center to identify activity or device status deemed suspicious • Receive alerts if any of these conditions occur for proactive response times • Computrace data flags potential non-compliance: 14 Governance = Infrastructure = Customer Center Management of the process to monitor, direct, and control
  • 15. GRC Tools: Computrace Features Risk Management = Tools = Computrace Features Management of the process to monitor, direct, and control • Track software licenses • Receive alerts to be notified about suspicious behavior • Remotely recover or delete data from a device • Freeze a device to block access • Remove all data from a device at end-of-life • technology to brick or lock a device • Track the location of a device • Use geofences to monitor device movement • Investigate and recover stolen devices • Initiate an investigation to determine why a security incident occurred and prevent it from happening again • Investigate suspicious employee behavior • Identify security holes • Prevent incidents from happening again
  • 16. GRC Data: Computrace Device Data • Use Computrace data to prove compliance with corporate and government regulations: – Software license compliance report for contract negotiations and audits – Encryption status report to show which devices were properly protected with encryption – End-of-Life data delete certificate – Data delete audit log – Proof if data was accessed post-incident Compliance= Data = Computrace Data & Reports Conform to internal and external regulations, must be provable 16

Editor's Notes

  • #7: With the exception of Germany, companies had to spend more on their investigations, notification and response when their sensitive and confidential information was lost or stolen. As revealed in the 2014 Cost of Data Breach Study: Global Analysis, sponsored by IBM, the average cost to a company was $3.5 million in US dollars and 15 percent more than what it cost last year.
  • #8: Data Breaches are not just due to exploits aimed at an organisation’s network. More often than not, it is easier to get an organisation’s confidential information through one of its mobile devices: laptop, tablet, smartphone.
  • #13: Update map