Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Absolute Software > Endpoint Security - Data Protection for IT, Freedom for Laptop Users
 

Endpoint Security - Data Protection for IT, Freedom for Laptop Users

White Paper Published By: Absolute Software
Absolute Software
Published:  Sep 09, 2011
Type:  White Paper
Length:  9 pages

A worldwide shift towards the use of mobile devices coupled with recently-enacted data breach legislation has created a new challenge for IT organizations: balancing the enhanced productivity of mobile computing with the requirement to protect sensitive information from data breach. Many organizations have tackled mobile computer security with corporate policy, others with encryption technology. Both strategies are heavily reliant on end-user diligence to remain effective. Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.                       




Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop