News | September 26, 2006

Mobile Computer Solutions: Fujitsu Signs Agreement To Resell Absolute Software's Computrace Mobile Computer Theft Recovery And Data Protection Solutions

Eight Layers of Security Options Provide Fujitsu Customers With the Flexibility to Meet Diverse Security Policies

Continuing its commitment to provide the highest levels of mobile computer security, Fujitsu Computer Systems Corporation expanded its relationship with Absolute Software Corporation today announcing a distribution agreement to resell the Absolute® Computrace® Computer Theft Recovery, Data Protection and Secure Asset Tracking™ software.

Fujitsu currently offers support for Computrace embedded in the system BIOS firmware of its award-winning line of high performance LifeBook® notebook PCs including ultra-portable and convertible notebooks, and flexible Stylistic® Tablet PCs, making the optional Computrace tracking and recovery application harder to defeat. Through the reseller agreement, customers can now purchase the Computrace® Complete, Computrace® Data Protection and Computrace® LoJack® for Laptops services directly from Fujitsu.

"The widespread presence of Fujitsu mobile products throughout healthcare, insurance, financial services, and government provides Absolute with a great opportunity to penetrate these vertical markets," said John Livingston, chairman and CEO of Absolute Software. "By offering Computrace Complete, Computrace Data Protection and Computrace LoJack for Laptops on its mobile devices, Fujitsu customers will be assured of the highest level of computer theft recovery and data protection."

"When a mobile device is stolen, there is the loss of the asset, but typically the more devastating loss is the information — often confidential — which is included on the hard drive," said Paul Moore, senior director of mobile product marketing, Fujitsu Computer Systems Corporation. "ComputraceComplete, Computrace Data Protection and Computrace LoJack for Laptops complement the security options offered in Fujitsu mobile computing devices by extending beyond securing data and system access to actually locating the device and remotely removing data files, which is invaluable if sensitive information is involved."

"It's important for companies of all sizes to create and enforce realistic security policies," said Richard Shim, senior research analyst, Personal Computing, IDC. "However, it's equally important that these policies do not impede upon worker productivity. With security a priority, PC companies that integrate a variety of options such as biometrics, TPM and asset recovery will have an advantage over competitors."

Absolute's Computrace technology powers its Guaranteed Computer Theft Recovery, Data Protection and Secure Asset Tracking services. Computrace helps IT managers know where up to 100% of their remote and mobile assets are at any given time, and provides not only traditional Information Technology Asset Management (ITAM) information such as hardware and software inventories, but also correlates where the computer is and who is using it. If a computer is stolen, from an enterprise or an individual, Computrace has the ability to track down its physical location for recovery and remotely delete sensitive data.

Eight Layers of Security

With a combination of physical, hardware and software security solutions, Fujitsu mobile products offer the flexibility to be deployed into any security environment regardless of security policy.

In addition to having embedded BIOS support for Computrace, Fujitsu further enhances security with an array of security features including:

  • Built-in biometric fingerprint swipe sensor eliminates the need for managing multiple passwords
  • Trusted Platform Module (TPM) is a discrete silicon chip that aids in system authentication and data encryption
  • Select Fujitsu mobile PCs have dedicated Smart Card support, which allows users to store passwords and other confidential information on a small plastic card
  • Security Panel protects mobile devices from unauthorized access with over 800,000 possible password combinations
  • BIOS Password Protection prevents unauthorized users from changing the BIOS setting and booting the mobile device
  • Two-Level Hard Disk Drive Password Protection allows system administrators and users to password-protect the hard drive
  • Security Lock physically secures mobile devices

About Fujitsu Computer Systems Corporation
Headquartered in Sunnyvale, Calif., Fujitsu Computer Systems is a wholly owned subsidiary of Fujitsu Limited (TSE: 6702) committed to the design, development and delivery of advanced computer systems, application infrastructure software products, and managed services for the business enterprise. Through its TRIOLE strategy, the company offers a complete line of scalable and reliable servers, storage and middleware solutions, high-performance mobile and client computers, as well as professional services. Fujitsu Computer Systems has established itself as a strategic solutions provider to the world's leading organizations by offering technology innovation, customer choice, exceptional product quality and reliability, as well as outstanding customer service. See http://us.fujitsu.com/computers for further information.

About Fujitsu
Fujitsu is a leading provider of customer-focused IT and communications solutions for the global marketplace. Pace-setting device technologies, highly reliable computing and communications products, and a worldwide corps of systems and services experts uniquely position Fujitsu to deliver comprehensive solutions that open up infinite possibilities for its customers' success. Headquartered in Tokyo, Fujitsu Limited (TSE: 6702) reported consolidated revenues of about 4.8 trillion yen (US$40.6 billion) for the fiscal year ended March 31, 2006. See http://www.fujitsu.com for further information.