Computrace Data Protection Software License

Posted on
  1. Remove the software to prevent future alerts; re-authorize a blocked application; Remove a controlled application. You have a choice of 2 removal methods. Remove a controlled application using Add/Remove programs in Windows Control Panel. To access the Add/Remove programs utility from the Windows Control Panel: Click Start Settings Control.
  2. Computrace is a former product and brand of Absolute’s, superseded in 2015. The Absolute platform includes newer and enhanced versions of the device tracking capabilities of Computrace, plus numerous new capabilities to help with security and compliance.

Win Computrace Data Protection allows customers to track stationary, remote, and mobile computer assets and remotely wipe sensitive data if the computer is lost, stolen, or nearing the end of its lifecycle. Typically it is managed by a company IT department.


Computrace absolute


Dell computrace
  • Embedded in the BIOS firmware.
  • Remove sensitive data at computer end of life or lease.
  • Monitor computers on an internet map as they change hands and move through your organization.
  • Generate asset reports for upgrades, rollouts and computer retirement.
  • View daily reports on unauthorized software use and hardware changes.

Absolute Computrace allows Panasonic corporate customers to centrally track and secure their IT assets within a single cloud-based console – the Absolute Customer Centre. Samsung mobile mtp device drivers downloadnewthings.


Asset Administration

Manage Toughbooks regardless if a device is on or off the company network. Collect comprehensive information from each device, then create customised policies and alerts so you can be notified as soon as an unauthorized change is detected. Asset information includes user identification, physical location, and the installation of software/hardware that may not comply with government and corporate regulations.

Data & Device Security

Dell Computrace

Remotely delete sensitive data on missing computers including an audit log of the deleted files to prove the data was removed from the device. Freeze a device with a custom message to the user. Access and retrieve files regardless of location.



Track assets on an internet map including current and historical locations. Build geofences to contain a device and receive an alert if it strays. If a device is not where it should be, investigate and determine if further action is required.

Theft Recovery

Absolute Computrace Removal

At our customer’s request, the Absolute Investigations & Recovery team will work closely with local police to recover a stolen device. We successfully recover thousands of devices each year.

Computrace Data Protection Software License Renewal

Endpoint Forensics

Absolute Software Computrace


What Is Computrace

The Absolute Investigations & Recovery team can forensically mine a stolen computer over the internet using key captures, registry and file scanning, geolocation, and other investigative techniques to determine who has the computer and what they’re doing with it, including whether any data was accessed post-theft.