On-Demand Webinar
Tracking and Recovering Missing Devices
45 mins


Understanding the new tools for managing your lost or stolen devices
As an IT professional in education, you know better than anyone that lost or stolen devices are a fact of life.
Absolute’s latest release introduces a level of transparency around missing devices – where they are, who’s using them, how to locate – previously only available to law enforcement.
It’s important that your team knows how to use this new functionality, so we’re hosting a 45-minute training session to bring you up-to-speed.
Everyone with a role in your school’s missing device workflow should attend to learn:
- Where to find and how to use the new information in the Absolute console
- How to verify if a device has truly been stolen, and what to do next
- Filed a missing device report before? – what’s changed and what stays the same
We’re excited to expose this new degree of visibility and control, and look forward to sharing it with you.
Register for the webinar
Thank you!
Featured Webinars
Transitioning from VPN to ZTNA

Transitioning from VPN to ZTNA
VPNs have been the enterprise workhorse for enabling secure remote access to mission-critical applications. But the security landscape is becoming ever more threatening. Learn how you can strengthen your security posture while streamlining mobile and hybrid workforce productivity by layering on Zero Trust Network Access to VPN.
Empowering Organizations to Troubleshoot in a Remote Workculture

Empowering Organizations to Troubleshoot in a Remote Workculture
In today’s work-from-anywhere environment, device and security risks can appear from a variety of different sources. IT and security teams are expected to swiftly troubleshoot potential risks before they progress into more serious security incidents. Learn how you can utilize Absolute’s remediation capabilities to identify and respond to device risks and vulnerabilities to maintain your organization’s security posture, lower helpdesk costs, and assure employee productivity.
Self Healing: Ensure the efficacy of your most valued security applications

Self Healing: Ensure the efficacy of your most valued security applications
How do you ensure the critical applications you’ve invested in are always functioning across your endpoint? Learn how Application Resilience helps to maintain the efficacy of security tools such as anti-malware, encryption, unified endpoint management tools, and endpoint detection and response solutions through automated self-healing and remediation.
Agenda
Featured Speakers

Jeff Gambrell
Senior Manager, Investigations, Absolute

Barkha Ramnauth
Customer Success Manager, Absolute

We were able to provide the board with quantitative information about device utilization that drives consensus so the budget could be approved. Also, peace of mind with security, privacy, and theft recovery.