As digital transformation initiatives drive more hi-tech processes and connected devices, the threat landscape is more like a thicket, and IT security teams are already stretched. Device fleet security is already a heavy lift; the clever cybercriminals and skyrocketing vulnerabilities, that’s just a bonus (in reverse).

The Need for ML and AI

Mounting cyber risk is a global concern — the 2019 CEO Imperative Study from Ernst & Young shows CEOs now believe cybersecurity is the top threat to the global economy over the next five to ten years. And the rising cybersecurity skills shortage, as well as potential career burnout by existing IT security staff, makes this an international emergency.

In response to cyber fragility and the need for more effective IT operations, we recruited machines to help us meet this challenge—machine learning (ML) and artificial intelligence (AI). In a report from Capegemini, 69% of executives believe AI will be necessary to respond to cyberattacks and 73% of enterprises are testing use cases for AI for cybersecurity.

In a recent Forbes magazine article, Why AI is the Future of Cybersecurity, Absolute’s CTO Nicko van Someren puts it this way:

“It’s no surprise that Capgemini’s data shows security analysts are overwhelmed. The cybersecurity skills shortage has been growing for some time, and so have the number and complexity of attacks; using machine learning to augment the few available skilled people can help ease this. What’s exciting about the state of the industry right now is that recent advances in machine learning methods are poised to make their way into deployable products.”

The Power of Automation: Absolute Unveils New Updates to Enterprise Resilience Edition

As ML and AI balance the workload and improve response to cyber threats, automation is also the key to endpoint resilience. The Absolute Reach Library — the query and response capability in the Absolute platform —enables IT automation with 118 ready-made commands in the most recent release of the Absolute platform. Nothing is out of reach (pardon the pun), allowing IT and security teams to command any device anywhere, on or off the corporate network.

New Reach ready-to-use workflows introduced this week simplify security policy deployments and remotely manage your devices, including:

  • Windows Update Command: Pinpoint vulnerable devices with pending or failed Microsoft OS updates
  • Automated Log Analytics: Detect initial signs of endpoint security exposures and potential incidents by automatically discovering frequent and common issues from event logs
  • Windows Configuration Enforcement: Audit Windows features and local accounts on devices, as well as modify settings to maximize energy savings and ensure an optimal and consistent user experience

Absolute has also rolled out new Live Chat Support to give enterprise IT and security teams the consumer-like experience to realize endpoint resilience — no tickets, no email, no toll-free numbers. On-demand chat support removes the dependency on outdated modes of technology support, ensuring Absolute customers receive real-time answers and information, so they can focus on their organization’s resilience.

And there’s one, more thing… Policy is the bedrock of any security program. Because at its core, policy says, “This can do that. That cannot do this”. So, Absolute made policy simple and easy. With changes to your Absolute policy groups, you can swiftly and fluidly direct devices to dynamic policies without cycles of enroll/unenroll/reenroll that wastes valuable IT time and brain power.

Read: Creating an Information Security Policy That Works

With easy to manage and staggering speed, IT and security teams get the bedrock protection they demand (airtight policies), without the grind of manual cleanup.

Today’s threat landscape requires the automation of updates, patches and security policies in real-time. Short of that, exposures become exploits and endpoint resilience is lost.

Learn more about Reach and how Absolute enables IT to remote manage devices and seamlessly and fluidly apply and adjust security policies to any endpoint or group of endpoints.