Computrace Security Software

Panasonic’s Data Security Warranty offers the ultimate in tracking, managing and protecting digital assets for complete computer security. Panasonic is a preferred provider of Absolute® Computrace. Using any type of Internet connection, you can centrally manage your Toughbook Computers within a single cloud-based console – the Absolute Customer Centre. You can identify any Toughbook Computers that have gone missing, enforce software policies, and maintain a fleet of optimally running devices. If a Toughbook Computer is reported missing or stolen, Absolute  Computrace can help you recover your Toughbook Computer via the Absolute Investigations & Recovery team.

Call us to discuss your needs.

£25.00£138.00 Ex VAT

Lease this unit from only £0.53 per month - call us for more details. Zero Interest Lease option available on 10+ unit orders



  • Embedded in the BIOS firmware.
  • Remove sensitive data at computer end of life or lease.
  • Monitor computers on an internet map as they change hands and move through your organization.
  • Generate asset reports for upgrades, rollouts and computer retirement.
  • View daily reports on unauthorized software use and hardware changes.

Absolute Computrace allows Panasonic corporate customers to centrally track and secure their IT assets within a single cloud-based console – the Absolute Customer Centre.

Asset Administration

Manage Toughbooks regardless if a device is on or off the company network. Collect comprehensive information from each device, then create customised policies and alerts so you can be notified as soon as an unauthorized change is detected. Asset information includes user identification, physical location, and the installation of software/hardware that may not comply with government and corporate regulations.

Data & Device Security

Remotely delete sensitive data on missing computers including an audit log of the deleted files to prove the data was removed from the device. Freeze a device with a custom message to the user. Access and retrieve files regardless of location.


Track assets on an internet map including current and historical locations. Build geofences to contain a device and receive an alert if it strays. If a device is not where it should be, investigate and determine if further action is required.

Theft Recovery

At our customer’s request, the Absolute Investigations & Recovery team will work closely with local police to recover a stolen device. We successfully recover thousands of devices each year.

Endpoint Forensics

The Absolute Investigations & Recovery team can forensically mine a stolen computer over the internet using key captures, registry and file scanning, geolocation, and other investigative techniques to determine who has the computer and what they’re doing with it, including whether any data was accessed post-theft.

Additional information

Weight 0.01 kg

12 Months, 24 Months, 36 Months, 48 Months, 60 Months


Resilience, Control