informa
/
News

Fujitsu, Absolute Sign

Fujitsu Computer Systems Corporation expanded its relationship with Absolute Software

SUNNYVALE, Calif. -- Continuing its commitment to provide the highest levels of mobile computer security, Fujitsu Computer Systems Corporation expanded its relationship with Absolute Software Corporation today announcing a distribution agreement to resell the Absolute® Computrace® Computer Theft Recovery, Data Protection and Secure Asset Tracking™ software.

Fujitsu currently offers support for Computrace embedded in the system BIOS firmware of its award-winning line of high performance LifeBook® notebook PCs including ultra-portable and convertible notebooks, and flexible Stylistic® Tablet PCs, making the optional Computrace tracking and recovery application harder to defeat. Through the reseller agreement, customers can now purchase the Computrace® Complete, Computrace® Data Protection and Computrace® LoJack® for Laptops services directly from Fujitsu.

"The widespread presence of Fujitsu mobile products throughout healthcare, insurance, financial services, and government provides Absolute with a great opportunity to penetrate these vertical markets," said John Livingston, chairman and CEO of Absolute Software. "By offering Computrace Complete, Computrace Data Protection and Computrace LoJack for Laptops on its mobile devices, Fujitsu customers will be assured of the highest level of computer theft recovery and data protection."

"When a mobile device is stolen, there is the loss of the asset, but typically the more devastating loss is the information -- often confidential -- which is included on the hard drive," said Paul Moore, senior director of mobile product marketing, Fujitsu Computer Systems Corporation. "ComputraceComplete, Computrace Data Protection and Computrace LoJack for Laptops complement the security options offered in Fujitsu mobile computing devices by extending beyond securing data and system access to actually locating the device and remotely removing data files, which is invaluable if sensitive information is involved."

"It's important for companies of all sizes to create and enforce realistic security policies," said Richard Shim, senior research analyst, Personal Computing, IDC. "However, it's equally important that these policies do not impede upon worker productivity. With security a priority, PC companies that integrate a variety of options such as biometrics, TPM and asset recovery will have an advantage over competitors."

Fujitsu Ltd. (Tokyo: 6702; London: FUJ; OTC: FJTSY)