Welcome!

News Feed Item

Absolute Software Expands Mobile Content Management Capabilities to Android

Now IT Managers Can Securely Distribute and Manage Documents and Media Files to Android Tablets with AbsoluteSafe

VANCOUVER, Jan. 15, 2013 /PRNewswire/ - Absolute® Software Corporation ("Absolute" or the "Company") (TSX: ABT), the industry standard for persistent endpoint security and management solutions for computers, laptops and ultra-portable devices announced today Android tablet support for AbsoluteSafe with the launch of Absolute Manage 6.1.5.

AbsoluteSafe is a Mobile Content Management (MCM) application available with Absolute Manage that allows organizations to securely distribute and manage content to mobile devices, eliminating the security risks associated with traditional document sharing apps and email. Now, AbsoluteSafe support is extended to Android tablets providing feature parity with the existing iOS version.

"AbsoluteSafe for Android and iOS devices allows our customers to control how and when users connect with sensitive corporate data, a key component of secure data management," states John Livingston, Chairman and CEO at Absolute Software. "With this complete control, organizations can securely share files on corporate and employee-owned devices."

Along with policy-based secure media transfer, IT administrators can restrict the files from being emailed, printed, or moved outside of AbsoluteSafe. And files in AbsoluteSafe can be password protected, providing an additional layer of security for organizations when distributing content to ultra-portable devices. For sensitive corporate content, access can be set with a specific expiry time so documents are automatically removed from the device regardless if it is on or off the network.  And for greater operational efficiency, the administrative work required to deposit documents into AbsoluteSafe can be transferred to non-IT employees that have been granted the appropriate permissions.

Most importantly, if a device is at risk - Absolute Manage will automatically remove it from management and the AbsoluteSafe app will be removed, preventing unauthorized access to any sensitive corporate content it may contain.

Availability

Absolute Manage 6.1.5 is available today.  For more information about AbsoluteSafe read the datasheet: http://www.absolute.com/shared/datasheets/abt-as-ds-e.pdf

About Absolute Software

Absolute Software Corporation (TSX: ABT) is the industry standard in persistent endpoint security and management for computers, laptops and ultra-portable devices. The Company, a leader in device security and management tracking for more than 18 years, has over 30,000 commercial customers worldwide. Positioned as a Visionary vendor in Gartner, Inc.'s Magic Quadrant for Client Management Tools, Absolute's solutions - Computrace®, Absolute Manage, Absolute Secure Drive, and Computrace LoJack® for Laptops - provide organizations with actionable intelligence to prove compliance, securely manage BYOD, and deliver comprehensive visibility and control over all of their devices and data. The Company's Computrace persistence technology is embedded in the firmware of computers, netbooks, and tablets by global leaders, including Acer, ASUS, Dell, Fujitsu, HP, Lenovo, Motion, Panasonic, Samsung, and Toshiba, and the Company has reselling partnerships with these OEMs and others, including Apple. For more information about Absolute Software, visit www.absolute.com.

This press release contains forward-looking statements that involve risks and uncertainties. These forward-looking statements relate to, among other things, the expected performance, functionality and availability of our services and products, and other expectations, intentions and plans contained in this press release that are not historical fact. When used in this press release, the words "plan," "expect," "believe," and similar expressions generally identify forward-looking statements. These statements reflect our current expectations. They are subject to a number of risks and uncertainties, including, but not limited to, changes in technology and general market conditions. In light of the many risks and uncertainties you should understand that we cannot assure you that the forward-looking statements contained in this press release will be realized.

©2013 Absolute Software Corporation. All rights reserved. Computrace and Absolute are registered trademarks of Absolute Software Corporation. LoJack is a registered trademark of LoJack Corporation, used under license by Absolute Software Corporation. LoJack Corporation is not responsible for any content herein. U.S. patents # 5,715,174, # 5,764,892, # 5,802,280, # 5,896,497, # 6,087,937, # 6,244,758, # 6,269,392, # 6,300,863, # 6,507,914, # 7,818,557, # 7,818,803, # 7,945,709, # 8,062,380, # 8,234,359, # 8,241,369, # 8,307,055 and # 8,332,953. Canadian patents # 2,211,735, # 2,284,806, and # 2,205,370. U.K. patents # EP0793823, # GB2298302, and # GB2338101. German patent # 69512534. Australian patent # 699045. Japanese patent # JP4067035. The Toronto Stock Exchange has neither approved nor disapproved of the information contained in this news release.

SOURCE Absolute Software Corporation

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
Consumers increasingly expect their electronic "things" to be connected to smart phones, tablets and the Internet. When that thing happens to be a medical device, the risks and benefits of connectivity must be carefully weighed. Once the decision is made that connecting the device is beneficial, medical device manufacturers must design their products to maintain patient safety and prevent compromised personal health information in the face of cybersecurity threats. In his session at @ThingsExpo...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
SYS-CON Events announced today that Grape Up will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company specializing in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market across the U.S. and Europe, Grape Up works with a variety of customers from emergi...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...
SYS-CON Events announced today that Massive Networks will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Massive Networks mission is simple. To help your business operate seamlessly with fast, reliable, and secure internet and network solutions. Improve your customer's experience with outstanding connections to your cloud.
Everything run by electricity will eventually be connected to the Internet. Get ahead of the Internet of Things revolution and join Akvelon expert and IoT industry leader, Sergey Grebnov, in his session at @ThingsExpo, for an educational dive into the world of managing your home, workplace and all the devices they contain with the power of machine-based AI and intelligent Bot services for a completely streamlined experience.
Because IoT devices are deployed in mission-critical environments more than ever before, it’s increasingly imperative they be truly smart. IoT sensors simply stockpiling data isn’t useful. IoT must be artificially and naturally intelligent in order to provide more value In his session at @ThingsExpo, John Crupi, Vice President and Engineering System Architect at Greenwave Systems, will discuss how IoT artificial intelligence (AI) can be carried out via edge analytics and machine learning techn...
FinTechs use the cloud to operate at the speed and scale of digital financial activity, but are often hindered by the complexity of managing security and compliance in the cloud. In his session at 20th Cloud Expo, Sesh Murthy, co-founder and CTO of Cloud Raxak, showed how proactive and automated cloud security enables FinTechs to leverage the cloud to achieve their business goals. Through business-driven cloud security, FinTechs can speed time-to-market, diminish risk and costs, maintain continu...
"Cloud computing is certainly changing how people consume storage, how they use it, and what they use it for. It's also making people rethink how they architect their environment," stated Brad Winett, Senior Technologist for DDN Storage, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Existing Big Data solutions are mainly focused on the discovery and analysis of data. The solutions are scalable and highly available but tedious when swapping in and swapping out occurs in disarray and thrashing takes place. The resolution for thrashing through machine learning algorithms and support nomenclature is through simple techniques. Organizations that have been collecting large customer data are increasingly seeing the need to use the data for swapping in and out and thrashing occurs ...