• Accessories
  • Computer Product Solutions

    CF-31 CF-D1 CF-19 CF-52 CF-C2 CF-53 CF-H2 Field CF-H2 Health FZ-A1 CF-U1 CF-AX3 JT-B1 FZ-G1 CF-U1 PIMD UT-MB5 FZ-M1 UT-MA6

Security software

DATA SECURITY WARRANTY (Optional Professional Service)
Panasonic’s Data Security Warranty offers the ultimate in tracking, managing and protecting digital assets for complete computer security. Panasonic is a preferred provider of Absolute® Computrace. Using any type of Internet connection, you can centrally manage your Toughbook Computers within a single cloud-based console – the Absolute Customer Centre. You can identify any Toughbook Computers that have gone missing, enforce software policies, and maintain a fleet of optimally running devices. If a Toughbook Computer is reported missing or stolen, Absolute  omputrace can help you recover your Toughbook Computer via the Absolute Investigations & Recovery team.

WARRANTY BENEFITS

  • Embedded in the BIOS firmware.
  • Remove sensitive data at computer end of life or lease.
  • Monitor computers on an internet map as they change hands and move through your organization.
  • Generate asset reports for upgrades, rollouts and computer retirement.
  • View daily reports on unauthorized software use and hardware changes.

Absolute Computrace allows Panasonic corporate customers to centrally track and secure their IT assets within a single cloud-based console – the Absolute Customer Centre.

Asset Administration
Manage Toughbooks regardless if a device is on or off the company network. Collect comprehensive information from each device, then create customised policies and alerts so you can be notified as soon as an unauthorized change is detected. Asset information includes user identification, physical location, and the installation of software/hardware that may not comply with government and corporate regulations.

Data & Device Security
Remotely delete sensitive data on missing computers including an audit log of the deleted files to prove the data was removed from the device. Freeze a device with a custom message to the user. Access and retrieve files regardless of location.

Geotechnology
Track assets on an internet map including current and historical locations. Build geofences to contain a device and receive an alert if it strays. If a device is not where it should be, investigate and determine if further action is required.

Theft Recovery
At our customer’s request, the Absolute Investigations & Recovery team will work closely with local police to recover a stolen device. We successfully recover thousands of devices each year.

Endpoint Forensics
The Absolute Investigations & Recovery team can forensically mine a stolen computer over the internet using key captures, registry and file scanning, geolocation, and other investigative techniques to determine who has the computer and what they’re doing with it, including whether any data was accessed post-theft.