Unmatched asset protection and software persistence
Use Cases and Deployment Scope
We started using this product when it was software similar to lojack. We used it to find and recover lost/stolen laptops. Later we used it for asset tracking and most recently take advantage of the software resiliency. This helps to keep software we know we want on our computers regardless of users deleting applications like VPN software or antivirus.
Pros
- Keeps track of assets
- reinstalls software
- reinstalls itself through the computer's bios
Cons
- It is difficult to remove the software from computers on some occasions
- The computer wipe action does not do a great job of keeping track of the certificate of destruction
- We have had computers stop reporting to Absolute Resilience
Most Important Features
- Asset management
- Application persistence
- bios integration
- geofencing
Return on Investment
- ability to recover lost and stolen laptops
- better management of asset life cycle
- Ease of asset data destruction
Other Software Used
CrowdStrike Falcon Endpoint Protection, Microsoft Endpoint Manager (Microsoft Intune + SCCM), Kofax Power PDF