Absolute Software Corporation, a leading provider of firmware-based, patented, computer theft recovery, data protection, and IT asset management solutions announced today that Getac rugged notebooks and tablet PCs are now available with firmware support for Absolute’s mobile computer anti-theft and IT asset management solution Computrace.
“Getac rugged notebooks and tablet PCs are designed for the mobile workforce in extreme environments—on an oil rig, in emergency response vehicles, or helping firefighters with rescue planning,” said Jim Rimay, president of Getac Inc. “Having Computrace embedded in the firmware of our computers gives our customers the additional security and satisfaction of knowing they can track and manage computers as well as delete sensitive data even if the hard drive is replaced or reformatted. Absolute’s services are an ideal complement to our world-class rugged notebook computers and tablets."
Getac is a pioneer and leading innovator for the rugged mobile computing solutions, created as a joint venture by MiTac and GE Aerospace. Its fully rugged notebooks, tablet PCs, and handhelds are used by military, law enforcement, and public safety, and are sold by HP and various other resellers.
Getac is currently embedding support for Absolute’s patented Computrace technology in the firmware of its A790 and V100 models. The B300, E100, M230, P470 models will be phased in over the coming months. Once the roll-out is complete, Getac’s full line of rugged laptop and tablet computers will feature support for Computrace software, enabling it to self-heal and survive hard drive reformats and replacement.
With Computrace, Getac customers have access to the tamper-resistant BIOS agent that supports the complete range of Absolute’s anti-theft and management solutions that enable the user to:
* Track and manage computers on the LAN or in the field
* Remotely delete sensitive information for regulatory compliance
* Physically track and recover lost or stolen computers
* Easily inventory all computers regardless of their location
* Remotely inventory software licenses
* Detect hardware changes or prohibited software installations
* Conduct post-theft forensic investigations into computer use
“Keeping track of computers distributed to mobile employees is virtually impossible with traditional IT asset management systems.” said John Livingston, chairman and CEO of Absolute. “Absolute offers users such as Getac customers the ability to secure and manage their computers in the field. And if a computer is lost or stolen, we can recover them or remotely delete sensitive information to prevent it from falling into the wrong hands.”
Computrace software is embedded in the firmware of computers right at the factory for tamper-resistance. The stealthy Computrace Agent is capable of surviving operating system re-installations as well as hard-drive reformats, replacements, and re-imaging. It can be activated by customers when they purchase a subscription with terms ranging from one to four years.
When a computer equipped with Computrace is reported stolen, the Computrace Agent sends a silent signal over the Internet to the Absolute Monitoring Center, allowing the Absolute Theft Recovery Team to forensically mine the computer using a variety of procedures including key captures, registry scanning, file scanning, geolocation, and other investigative techniques to determine who has the computer and how it is being used. Absolute then works with local law enforcement agencies to recover the computer. Staffed by former law enforcement officers, the team finds stolen computers through their relationships with over 1,000 police departments around the world. With over 650 years of combined law enforcement experience, the Absolute Theft Recovery Team currently recovers an average of more than 85 stolen computers each week.
For more information about Absolute and its line of Computrace solutions visit www.absolute.com.
To learn more about Getac Inc. and the company’s rugged notebooks and tablet PCs, please visit www.getac.com.
Operation Convergent Response demonstrates the latest first responder technologies in live exercises, including active shooter attack.