Enterprise IT teams face an uphill struggle to maintain visibility into and control over corporate resources and to mitigate risks to critical business assets. The ever-growing distributed nature of corporate networks, brought about by Cloud adoption and the proliferation of mobile devices, has increased the complexity over IT situational awareness while also narrowing the field of sight, enabling cybercrime to thrive.
In a new Technology Spotlight by market intelligence researchers at IDC, modern endpoint security strategies are examined in the light of the need for always-on IT connectivity to endpoint devices, describing how the Persistence offered by Absolute Data & Device Security (DDS) can significantly reduce the attack surface and prevent data loss.
The IDC Technology Spotlight, Modern Embedded Endpoint Security: Gain Visibility into and Control of Data, Devices, and Applications Regardless of Location and Connectivity, shares the latest research on endpoint risk. According to the findings of a joint IDC–The Channel Company Security Trends Survey conducted in July and August 2016, laptops and workstations were cited as the leading vulnerability in enterprise environments, followed by employee errors and mobile device risks. Clearly, with the top three concerns being related to the endpoint, IT teams face an uphill slog in defending the endpoint.
In this Technology Spotlight, you will read about:
- The growing threats to the endpoint
- How cyber attackers bypass security software on the endpoint
- Insider threats
- The risks introduced by Cloud adoption
- What embedded security technology / firmware persistence offers to combat threats to the endpoint
- How Absolute’s offering provide endpoint resiliency and protection
Firmware persistence and data governance as provided by Absolute DDS can provide IT teams with the level of visibility and resiliency to help IT teams regain control over the endpoint, preventing or detecting issues related to employee errors, malicious insiders or even cyber attacks. This same visibility has recently been extended to Applications, allowing you visibility and control over your entire endpoint security stack. Read more in the technology spotlight or at Absolute.com