Absolute Computrace Launches Event Calling - A Tailored Response to Potential Data Breaches and Security IncidentsVANCOUVER, July 30, 2014 /PRNewswire/ - Absolute® Software Corporation (TSX: ABT), the industry standard for persistent endpoint security and management solutions for computers, laptops, tablets and smartphones, today launched Event Calling, a security feature supported by Absolute persistence technology. Event Calling is available with Absolute Computrace® and allows customers to receive immediate alerts if an event they consider to be significant occurs. Absolute customers can design thousands of different conditions to trigger an alert, allowing them to tailor their security protocols to address the unique needs of their business. Some examples of conditions include if the device hardware or software is altered, if a device connects to a different network, changes location, or if a different user logs on to the device. Event Calling is particularly relevant to organizations that must adhere to strict data security regulations such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare and broader reaching regulatory requirements such as Sarbanes Oxley, the Gramm-Leach-Bliley Act of 1999, and others. Organizations bound by these regulations have strict policies in place to control corporate devices and the data they contain. If an unauthorized action or status occurs - for example if a device moves outside of a geographical location - it can be a prelude to a more serious security event. Event Calling will warn IT when a notable change occurs on the endpoint using a level of priority that is set by the customer. This early warning will allow IT to take proactive security measures using Computrace to remotely track, freeze, delete data, or recover data from the device. Computrace allows organizations to persistently track and secure all of their endpoints within a single cloud-based console. Computers, tablets and smartphones can be remotely managed and secured (on or off the network) to ensure—and most importantly prove—that endpoint IT compliance processes are properly implemented and enforced.