Absolute Endpoint Data Discovery Confronts Insider Threats
Absolute Endpoint Data Discovery Confronts Insider Threats

Absolute today announced the release of Endpoint Data Discovery (EDD), a new feature within Absolute Data & Device Security (DDS) that allows organizations to identify and protect sensitive data stored on an endpoint. EDD provides a unique counter to the insider threat by identifying devices and users accessing sensitive information in contravention of data access policies. EDD offers unparalleled visibility into data on the endpoint, giving organizations more control over data security than ever before:

“Endpoint Data Discovery is one of the most notable product advances in Absolute’s history,” said Eric Aarrestad, senior vice president, Product Management, Absolute. “EDD provides persistent visibility into at-risk data so organizations can verify where sensitive data resides and identify both negligent and malicious insiders. We are confident in the value this feature brings to our customers as well as its significance in expanding our market differentiation.”

According to recent research, up to 45% of corporate data remains on the endpoint, often unprotected. With more devices than ever before, the endpoint presents a growing attack surface that is becoming the greatest risk to sensitive data, through lost or stolen devices, malware, unsecured apps, inadequate protections or employee error or misuse. Most data protections on the endpoint are meaningless if an insider has the ability to bypass them, so how do you address the Insider Threat? By knowing exactly what data is on each endpoint and how it is protected. That’s where Absolute EDD comes in.

Leveraging Persistence technology from Absolute, a reliable two-way connection is maintained with each device. If suspicious activity is detected, a customer can determine if any sensitive data is at risk and take appropriate measures to protect it. Additionally, it allows an organization to determine the severity of an endpoint security incident and apply an appropriate response based on the level of risk associated with the data stored on the device.

With EDD, IT oversight is extended with a persistent endpoint connection to include devices located beyond the corporate network, a key differentiator from traditional data scanning technologies, which typically lack this depth of visibility.

“Endpoint Data Discovery helps our organization confirm where our most sensitive data lives and to more effectively monitor and restrict its exposure,” said John Krischer, senior manager of IT Operations, Answers Corporation. “This is a powerful and intuitive tool that allows us to prioritize content types and establish user access policies to sensitive data.”

EDD provides detailed reporting for regulatory compliance to prove no sensitive data was stored on a compromised device at the time of a security incident – definitive proof that no data was breached.

Endpoint Data Discovery is available now, with the release of Absolute DDS 6. Check out our video for more information.

ABOUT THE AUTHOR

Arieanna Schweber

Arieanna Schweber has been a part of the Absolute writing team since 2007. Arieanna was Canada’s first female professional blogger and has been professionally blogging since 2006 and has spoken at leading blogging conferences including BlogHer and Northern Voice. Arieanna has a joint degree in Business and Communications from Simon Fraser University and continues to build communities for Vancouver-based clients.