Featured Vendors (1 - 4 of 8)
Secular shifts in IT involving the exponential growth in the number of endpoints being deployed, and transfer of enterprise information from the data center to the endpoint, continue to represent an increasingly substantial information risk challenge. Lack of visibility due to disabled endpoint controls, or devices on the move, expose an organization to risks making it almost impossible to effectively defend their security posture, adding further complexity to their compliance mandates. Moreover, a single security layer alone is not sufficient to protect an organization, secure its devices, and safeguard its data. The attack surface is too vast and the attack vectors are numerous. Therefore, a self-healing, layered visibility, and control solution is the best way to prevent, assess, and respond to emerging threats in real-time. This is where Absolute comes into play.
Established in 1993, Absolute is positioned uniquely as an industry expert with a portfolio of always-on endpoint security and management solutions to protect devices, data, applications, and users. The company has leveraged its patented Persistence technology to deliver the industry’s first “self-healing endpoint security solution” that provides organizations with a unique level of omnipresent endpoint visibility, and the ability to execute the remediation of emerging security breaches at their source. Geoff Haydon, CEO of the firm says, “With Absolute, users have full confidence that endpoint controls are active and compliant. Plus, they will achieve higher levels of control and uncompromised visibility over their security posture across every security layer and also form an aggregate assessment of the entire security stack.”
The Absolute platform gives IT and security professionals absolute awareness and control of devices, data, and applications
The Absolute platform gives IT and security professionals absolute awareness and control of devices, data, and applications. It can enhance IT asset management, protect sensitive data, reduce insider threats, and ensure compliance. Along with capturing hundreds of data points, it can also provide enterprises the ability to evaluate the security posture of an endpoint and take preventative measures if necessary and monitor sensitive data as defined by the enterprise.
Absolute combines its cloud-based Device & Data Security (DDS) product with patented embedded Persistence technology, giving CISOs always-on visibility and real-time remediation to protect devices, data, applications, and users on or off the corporate network. DDS provides visibility into the four quadrants of telemetry: device characteristics, sensitive data, user behaviour, and application profile. Persistence is built into the firmware of more than one billion devices at the world’s leading OEMs like Acer, ASUS, Dell, Fujitsu, HP, Lenovo, Microsoft, Panasonic, Samsung, and Toshiba who are known amongst the biggest manufacturers of desktop and mobile devices. They want their customers to see and secure their devices, data, applications, and users whether on or off of the corporate network. “This is what gives us our edge: the ability to stay present and healthy at all times so IT and security pros know they can see and secure all their endpoints under the most extreme circumstances. No other technology provider can do this,” adds Haydon.
The company recently announced a new product called Application Persistence, which allows other third-party endpoint security agents to self-heal when attempts are made to compromise them either through a malicious attack or through an insider threat, for a more resilient security ecosystem. In February 2017, Application Persistence was awarded “Editor’s Choice in Application Security Solutions” by CDM magazine. “By enabling other security controls to reinstall and return to their original state of safety and efficacy just like our own products, we are creating a united front against persistent attackers and insider threats,” concludes Haydon.