Case Studies > Proactive device security at Auburn Washburn USD

Proactive device security at Auburn Washburn USD

Customer Company Size
Large Corporate
Region
  • America
Country
  • United States
Product
  • Absolute
  • Persistence® technology
Tech Stack
  • Asset Monitoring
  • Forensic Tools
Implementation Scale
  • Enterprise-wide Deployment
Impact Metrics
  • Cost Savings
  • Customer Satisfaction
  • Productivity Improvements
Technology Category
  • Functional Applications - Remote Monitoring & Control Systems
  • Cybersecurity & Privacy - Endpoint Security
Applicable Industries
  • Education
Applicable Functions
  • Facility Management
  • Business Operation
Use Cases
  • Asset Health Management (AHM)
  • Remote Asset Management
  • Theft Detection
Services
  • Cybersecurity Services
  • System Integration
About The Customer
The Auburn-Washburn (AW) School District in Kansas is made up of one early childhood center, seven elementary schools, one middle school, one high school, one alternative high school, and two alternative learning centers. The first devices were introduced to classrooms in 1998. The AW School District is committed to inspiring and challenging each of its students and maintains a noteworthy reputation as one of the highest performing school districts in Kansas. As part of its dedication to education excellence, AW introduced a school computing program that provides devices to 1,400 students and staff members.
The Challenge
Don Williams, AW’s Technology Coordinator, describes laptop theft as costly and inconvenient; it overstretches available resources and interrupts the workflow of both staff and students. As school boards often face a rigid budget, maximizing IT investments is essential. Each time a lost or stolen asset has to be replaced, the budget is challenged. Williams explains that current economic conditions have intensified the need to get the most out of IT assets, requiring AW to be particularly “proactive and reactive” in minimizing loss and maximizing the lifespan of their computer population.
The Solution
To combat theft, increase theft recovery capabilities, and ensure optimal use of its fleet, AW installed Absolute across 1,400 computers before rolling out their full-scale computing initiative. Of the product features that led AW to select Absolute, Williams identifies patented Persistence® technology as a key attribute. Embedded in the core of devices at the time of manufacture, the technology ensures that the Absolute software agent is in tact, making it virtually impossible for an unauthorized user to accidentally or deliberately remove it. AW uses Absolute to closely monitor the location and activities of its fleet. Each protected device checks into the Absolute Monitoring Center regularly, providing AW with up-to-date asset reports for each device. These reports provide information about the user, physical location, and the installation of hardware and software. By setting alerts to unauthorized changes, IT can proactively identify suspicious activity and respond efficiently. With Absolute in place, AW has the tools necessary to initiate theft recovery and see that the stolen device is recovered and returned to the district. Once AW reports a theft to Absolute, the Absolute Investigations team deploys a series of forensic tools that track the laptop’s location and identify the user. This information provides police with the details necessary to make the physical recovery and return the machine to its rightful owner. “Logistically, I would much rather get a laptop back than have to replace it,” Williams notes.
Operational Impact
  • Receive alerts to changes such as a device leaving the school premises.
  • Identify the location and status of each device with no time-consuming physical inventory requirements.
  • With the help of the Absolute Investigations team and law enforcement, stolen laptops are recovered.
Quantitative Benefit
  • AW installed Absolute across 1,400 computers.
  • The school computing program provides devices to 1,400 students and staff members.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.