Absolute recently announced an agreement with Advanced Micro Devices (AMD) to incorporate our Persistence technology into AMD chip designs.
There have been a number of troubling reports, including one from the Government Accountability Office (GAO), indicating that data breaches at federal agencies involving personally identifiable information (PII) have been on the rise. According to reports, federal agencies continue to struggle in many areas of data security, from security policies and procedures to security controls and incident response programs.
The National Cybersecurity Center of Excellence (NCCoE) at the U.S. National Institute of Standards and Technology (NIST) just released a draft of its first cybersecurity practice guide, “Securing Electronic Health Records on Mobile Devices.” The document serves as a “how to guide” with a solution on how to secure PHI with ideas consistent with cybersecurity standards and best practices.
Today’s SIEM solutions gather, analyze, and present a holistic view of information from network and security devices like identity and access management applications, vulnerability management and policy compliance tools, operating system, database and application logs, external threat data and important information from endpoint security applications such as Absolute Data & Device Security (DDS), formerly Absolute Computrace.
Earlier this Summer, Absolute unveiled a new brand identity that reflects security and innovation as our core offering. The brand sets a clear purpose for Absolute and gives us greater focus on our core business of device and data security. To reinforce the shift in our brand identity, which went live across all corporate assets in July, we transformed the Absolute headquarters in Vancouver as well.
At Absolute, we are always listening to our customers and gathering feedback on the challenges they face within their IT environments. Many of our customers have reported that Microsoft SCCM is an important component within their IT security and management stack.
Healthcare IT is undergoing a complex and challenging transformation. Today healthcare IT departments must not only keep up with ever-changing regional and global regulations surrounding protected health information (PHI), they also have to stay one step ahead of cybercriminals and situations that could lead to data breaches—even if they’re accidental.
Today’s healthcare organizations are under pressure to increase the affordability, quality and efficiency of patient care, all while streamlining costs and staying compliant with ever-changing regulatory legislation. Those demands alone are enough to strain resources to the breaking point. However, recent studies show that protecting patient information is one of the biggest challenges that modern health practices face.