Securing Security at Black Hat 2016 with Absolute Persistence
Securing Security at Black Hat 2016 with Absolute Persistence

Another year, another Black Hat – yet security breaches continue to devastate businesses and individuals. Clearly there are gaps in the technology we use to protect our endpoints and the sensitive data they contain. The truth is that endpoint protection measures are easily disabled and blindspots remain commonplace throughout our infrastructure, with little differentiation between the solutions we rely upon to detect and prevent these outcomes.

The same-old simply isn’t working anymore. Something has to give.

Security researchers, technology engineers, and executives from Absolute, including CTO Christopher Bolin, will be attending Black Hat in Vegas August 2-4 to unveil their answers to securing the security landscape. Join us at Booth 1262 to learn more about Persistence.

Kick Off Black Hat with Absolute & Topgolf

We’re also hosting a Cocktail Reception at Topgolf Las Vegas on August 2nd, before Black Hat gets underway. Take on our executives and security experts in a competitive round of interactive golf at the hottest new venue on the Las Vegas strip. If golf isn’t your thing, enjoy cocktails and canapés by the pool or check out live music.

When: Aug 2, 2016, 5:00 – 8:00 pm
Where: Topgolf Las Vegas, MGM Grand, 4627 Koval Lane, NV 69109
RSVP: absolute.com/blackhat

Go head to head at Topgolf with Absolute executives and security experts. Register today to save your spot.

[button url=”https://www.absolute.com/en/landing/16/blackhat?sc_camp=63E94A567DC340A78E39D5F5E5472237″ icon=”none” size=”” target=”_blank” style=”color: #78BE20; text-align: center;”]Register Here[/button]

[divider type=”dottedline”]

Absolute can help you identify potential security threats and respond rapidly before they become damaging security incidents. Absolute Data & Device Security (DDS) allows organisations to persistently track and secure all of their endpoints within a single cloud-based console. Computers and ultra-portable devices such as netbooks, tablets, and smartphones can be remotely managed and secured to ensure—and most importantly prove—that endpoint IT compliance processes are properly implemented and enforced. Learn more here.