Endpoint Security

Endpoint Resiliency Enables Business Transformation: Client Story
Kim Ellery
Endpoint Resiliency Enables Business Transformation: Client Story

Working to promote the quality, accessibility and affordability of healthcare for all Dutch citizens, Zorginstituut Nederland occupies an independent yet critical position in the healthcare landscape in the Netherlands. In order to promote quality in healthcare, Zorginstituut transformed its 400-employee office to support greater mobility, agility and efficiency. To support its mobile workforce, Zorginstituut deployed the Absolute platform to protect sensitive data, instantly monitor changes to endpoints and remediate security incidents...

READ MORE
Absolute Endpoint Visibility & Resilience Platform Recognized
Kim Ellery
Absolute Endpoint Visibility & Resilience Platform Recognized

The explosion of mobile device usage and adoption of the cloud has caused a fundamental shift in how and where data resides.  As mobility and global connectivity has shifted, data, devices and users have moved outside of the firewall – creating urgency to gain visibility into and protect the endpoint. Absolute has been tackling this challenge head on, and was recently recognized by three organizations for providing leadership in essential...

READ MORE
From Dark to Resilient Endpoints at RSA Conference 2018
Pam O'Neal
From Dark to Resilient Endpoints at RSA Conference 2018

If you feel as though your endpoint security strategy is more like a house of cards than an impenetrable wall, we’ve outlined steps you can take now to improve your overall security posture. If you’re going to be in San Francisco next week, be sure to stop by and see us in the South Expo booth #1539. Absolute security experts will demonstrate how to use technology already embedded in...

READ MORE
Spectre & Meltdown: A Use Case in Endpoint Security
Richard Henderson
Spectre & Meltdown: A Use Case in Endpoint Security

While software vulnerabilities are more prevalent, hardware flaws aren’t anything new. And, they are back in the news again with more vulnerability disclosures at the processor level, this time impacting AMD chips. Most organizations have at least a few legacy machines still churning away, either because it’s a dusty relic of a long-passed merger, it’s simply been forgotten about, or because it still works and budgets are tight. Logical,...

READ MORE
Absolute Can Deliver 146% ROI and Reduces Risk of Breaches: Forrester Report
Kim Ellery
Absolute Can Deliver 146% ROI and Reduces Risk of Breaches: Forrester Report

Traditional endpoint security solutions that rely on a fallible agent is an inadequate line of defense – this isn’t news to most. For security that survives attacks you need to go deeper, to the firmware, allowing today’s dynamic endpoints to self-heal and impenetrable to negligent users or attackers. At Absolute, we can lay out this value claim but we don’t expect you to take our word for it. In...

READ MORE