Products

Introducing Endpoint Data Discovery on Absolute DDS
Introducing Endpoint Data Discovery on Absolute DDS

Your sales revenue? It’s heading out for a coffee. And that intellectual property awaiting patents? It’s off to the airport. Your data will go wherever your people go... and sometimes beyond. One study recently suggested that as much as 45% of corporate data is held on endpoint devices, often against corporate knowledge and completely unprotected. In order to protect your data, you must know...

READ MORE
Absolute Endpoint Data Discovery Confronts Insider Threats
Absolute Endpoint Data Discovery Confronts Insider Threats

Absolute today announced the release of Endpoint Data Discovery (EDD), a new feature within Absolute Data & Device Security (DDS) that allows organizations to identify and protect sensitive data stored on an endpoint. EDD provides a unique counter to the insider threat by identifying devices and users accessing sensitive information in contravention of data access policies. EDD offers unparalleled visibility into data on the...

READ MORE
Absolute Extends Persistence to Secure Third-Party Applications
Absolute Extends Persistence to Secure Third-Party Applications

Absolute today announced the launch of a new service that extends our Persistence technology to secure third-party software applications. Persistence Services by Absolute enables existing Absolute customers to ensure crucial applications remain installed on a device, regardless of user or location, on or off the corporate network. ...

READ MORE
Absolute Vancouver Headquarters: Why We’re Upgrading
Absolute Vancouver Headquarters: Why We’re Upgrading

What happens when a growing tech company starts to run out of office space in Vancouver? We get creative. For the first time in the history of Absolute, we are creating a purpose-built office space that will be tailored to support all of the different teams, work styles, and activities that exist at our Vancouver headquarters.

When we think about data security, we often think about big nameless groups of hackers banging at the ‘door’, trying to find a way inside the network. The truth is, while this Hollywood-ized view of data security highlights the challenges in protecting data from hackers, it doesn't speak the full truth. The real truth is that it’s a combination of all the ‘little things’...

READ MORE