Posts by Absolute Security

Absolute Security
Absolute Security is a single platform to manage and secure any endpoint, powered by Persistence technology rooted in your device firmware.

Contact sales@absolute.com or request a free demo at https://www.absolute.com/en/eval
Spectre & Meltdown: A Use Case in Endpoint Security
Absolute Security
Spectre & Meltdown: A Use Case in Endpoint Security

While software vulnerabilities are more prevalent, hardware flaws aren’t anything new. And, they are back in the news again with more vulnerability disclosures at the processor level, this time impacting AMD chips. Most organizations have at least a few legacy machines still churning away, either because it’s a dusty relic of a long-passed merger, it’s simply been forgotten about, or because it still works and budgets are tight. Logical,...

READ MORE
4 Steps to Vulnerability Management and Incident Response for Endpoints
Absolute Security
4 Steps to Vulnerability Management and Incident Response for Endpoints

A mature endpoint security strategy can significantly reduce the risk of an incident leading to a larger breach. As your first line of defense, investing in endpoint security helps prevent or at least slow the spread of threats, maintain some level of operations, and protect users. An effective endpoint security strategy can be as layered as you want it to be however you’ll have a strong foundation if you...

READ MORE
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…
Absolute Security
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…

This post originally appeared in CSO Magazine.  Everyone in the security world is talking about the EU’s General Data Protection Regulation (GDPR), and rightly so. GDPR is almost in full force, supplanting the older (and some will argue, out of date) EU Data Protection Directive (DPD). I don’t think regular readers of security news need to be reminded of the severity of penalties that the EU can levy against...

READ MORE
3 Steps to Asset Management and Software Auditing
Absolute Security
3 Steps to Asset Management and Software Auditing

With the explosion of laptops, IoT, tablets, smartphones and other smart technologies, endpoints are the single largest group of devices inside your network today. Since they are critical for business getting done, endpoint disruption can have a significant impact on your day to day operations. Protecting them is paramount. There are four key pillars to building an endpoint security program that does its job well and I detail each of...

READ MORE
Top Strategies for Tackling Endpoint Security
Absolute Security
Top Strategies for Tackling Endpoint Security

Endpoint devices are the single largest group of devices inside your network today – and growing bigger every day. The average employee uses at least three devices for work purposes (laptops, tablets, smartphones, IoT) and each one represents a potential entry point for an attacker to exploit and gain unlawful access. A single unmanaged device, a careless click on a malicious link, a targeted attack and endpoint devices can...

READ MORE