Data Visibility & Protection

Absolute Offers New Ways to Manage Windows User Profiles
Jason Short
Absolute Offers New Ways to Manage Windows User Profiles

“A chain is only as strong as its weakest link.” We’ve all heard this saying and unfortunately, most of us have also heard it applied to IT security as the chain with users as the weak link. Protecting data from the actions of users – whether intentional or not – has long been one of the greatest challenges IT pros face. Whether it’s via phishing emails, remote work habits...

READ MORE
The True Cost of One Healthcare Data Breach
Josh Mayfield
The True Cost of One Healthcare Data Breach

IT leaders are reinventing their infrastructures to support a mobile workforce and a complex array of connected devices. Against this backdrop of increased mobility and connectivity, healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to healthcare organizations. Protected Health...

READ MORE
How Wichita State University Improved Endpoint Visibility & Control
Juanma Rodriguez
How Wichita State University Improved Endpoint Visibility & Control

Long gone are the days when institutional data sits within a single, secure perimeter. Sensitive information now resides on multiple mobile endpoints handled by users who are constantly making changes to them. As more and more higher education institutions adopt 1:1 device programs, the challenge of securing that data only amplifies. Wichita State University (WSU), a public university in Wichita, Kansas that serves about 15,000 students, has experienced a...

READ MORE
How to Succeed in the Digital Healthcare Frontier
Josh Mayfield
How to Succeed in the Digital Healthcare Frontier

Healthcare is data. To effectively treat patients and create new forms of care, information must be shared, analyzed, and transmitted across several devices, among a number of healthcare professionals, insurance providers and other third parties. The sensitive nature of this personal information has long made healthcare an attractive target to cyber criminals while the complex nature of the industry creates continued struggles to protect the data, as frequent data...

READ MORE
Securing Shadow IT Starts with Automation
Jason Short
Securing Shadow IT Starts with Automation

Shadow IT is a modern security challenge for the very best reasons – your users rely on it to find new and arguably innovative ways to be more productive. While getting more done more effectively isn’t a bad thing, rogue applications that aren’t supported and maintained by IT is. While we haven’t seen Shadow IT in the headlines as much recently, the problem remains very real. Gartner estimated 38%...

READ MORE