Endpoint Security

5 Ways to Improve Insider Threat Prevention
Richard Henderson
5 Ways to Improve Insider Threat Prevention

If you browsed the latest security headlines, you’d probably think the majority of data breaches were related to hackers, political activists, malware or phishing. While the latter two hint at it, the truth is that nearly half of all data breaches can be traced back to insiders in some capacity. While we recently examined the rising of the politically motivated insider, the truth is that most incidents are traced back to employees...

READ MORE
Absolute Strengthens Endpoint Security Posture at Asplundh
Kim Ellery
Absolute Strengthens Endpoint Security Posture at Asplundh

Founded in 1928, Asplundh is a full-service utility contractor performing vegetation management services for specialized markets such as municipalities, railroads, pipelines and departments of transportation. With over 30,000 service professionals throughout the US, Canada, Australia and New Zealand, the complexity and number of endpoints have grown significantly in the past 10 years. With 95% of their workforce mobile, Asplundh struggled to manage and secure the devices in their deployment....

READ MORE
Absolute 7 Platform Extends Emerging Threat Response Capabilities
Kim Ellery
Absolute 7 Platform Extends Emerging Threat Response Capabilities

Building on the momentum of Absolute 7, our next-generation enterprise security platform featuring Reach technology, we’ve expanded our extensive query and remediation capabilities to give IT and security professionals more ways to tackle the changing risk landscape. With the latest enhancements to the  Absolute platform, organizations can address the growing need for enhanced vulnerability management, help drive enhanced endpoint security hygiene and more efficiently remediate emerging threats. The Absolute platform empowers IT...

READ MORE
Do You Have a Dark Endpoint Problem?
Richard Henderson
Do You Have a Dark Endpoint Problem?

Endpoint blind spots are large – and growing. According to the recent Cost of Insecure Endpoints study by Ponemon, 53% reported malware infected endpoints had increased in volume in the past 12 months alone and 63% said they could not monitor company endpoints once they left the corporate network. More attacks and less visibility is a recipe for disaster of course: it puts your data at great risk and...

READ MORE
Absolute’s Bob Lyle Named Deputy Chair to GSMA Device Security Group
Absolute’s Bob Lyle Named Deputy Chair to GSMA Device Security Group

Bob Lyle, Vice President of Mobile at Absolute, was recently appointed Deputy Chair of the Device Security Group, part of the GSMA’s Fraud and Security Group (FASG). GSMA is a global organization designed to convene and improve the mobile industry, with the FASG working on a range of topics including mobile device and application security, mobile malware, cloud service risks and controls and consumer protections. The aim of the...

READ MORE