On-demand Webinar45 mins
As an Absolute customer, you understand the importance of securing your devices, apps, and data. But a world of remote work has introduced new challenges. Since the end of March, we've tracked a 43% rise in incidences of sensitive data on endpoints.
You already have the tools at your disposal to manage and secure remote devices — and we’ll show you how to best make use of them.
- How to use Absolute to restrict access to devices and protect sensitive data — within your existing IT processes
- The many uses of Device Freeze, including forcing updates and responding to security threats
- Data protection tips using Device Wipe and Data Delete
- Plus: best practices for optimizing end-of-life workflow with Absolute
You’ll leave this session with practical advice for managing and securing remote endpoints.
Watch the on-demand webinar!
If you have already registered to this webinar, please login here.
Featured Speakers

Troy Knihnitski
Senior Customer Success Manager
Absolute

Murray Maleschuk
Senior Technical Product Manager
Absolute
“The role of Absolute is critical in two specific ways: it provides validation to our internal asset management platform and extends access to our computer population when we find them outside of our control."
Dave Johnson - Director, Strategic Services
Grant Thornton LLP