Data Visibility & Protection

Absolute Named the Leader in the G2 Crowd Grid® Report for Endpoint Management Winter 2019
Juanma Rodriguez
Absolute Named the Leader in the G2 Crowd Grid® Report for Endpoint Management Winter 2019

At Absolute, we’re passionate about our customers. We work hard to provide uncompromised visibility and near real-time remediation of security breaches at the endpoint. It’s rewarding to know our customers are equally as excited about us. Absolute is happy to share that it has been recognized as the Leader in the G2 Crowd Grid® 2019 Report for Endpoint Management. G2 Crowd is the world’s leading business solutions review website...

READ MORE
Back to the Basics for Data Breach Prevention
Mitch Kelsey
Back to the Basics for Data Breach Prevention

According to the Identity Theft Resource Center (ITRC), the number of significant data breaches at businesses, government agencies, and other organizations in the U.S. alone hit a new high of 1,579 in 2017. That number is much higher for 2018 says the ITRC, even though final numbers are not yet available. Both years are up substantially from fewer than just 200 in 2005, the year the non-profit started tracking...

READ MORE
How to Protect your Data if a Laptop is Lost or Stolen
Mitch Kelsey
How to Protect your Data if a Laptop is Lost or Stolen

For many organizations, the new year will mean a new budget cycle allowing for additional devices. IT and security teams get to feel like Santa handing out the shiny, new technology. It is easy to get caught up in the excitement. However, this is the time to be thinking about how to keep these devices, and their data, protected from both insider threats and external threats. It’s not fun...

READ MORE
The Criticality of Strong Cyber Hygiene
Josh Mayfield
The Criticality of Strong Cyber Hygiene

The more connected we become, the more at risk we are to cyber criminals who are busy looking for a chance to capitalize on our technology dependency. Unfortunately, we’ve seen this breakdown many times – in our hospitals when WannaCry ransomware forced medical personnel to turn away patients and in our local governments when ransomware used by the SamSam group rendered the city of Atlanta incapable of validating arrest...

READ MORE
New SSD Vulnerabilities Call for Deeper Endpoint Visibility and Control
Kim Ellery
New SSD Vulnerabilities Call for Deeper Endpoint Visibility and Control

Solid-state drives (SSD) have long been great tools because they automatically encrypt data stored on them and when the device is disconnected from its host device, the data on the SSD becomes unreadable. Additionally, hardware-based encryption uses fewer systems resources than software-based encryption so they were a perfect solution for data storage, or so we thought. Earlier this month, it was reported that researchers from Netherlands’ Radboud University published...

READ MORE