Geoff Haydon, Absolute’s CEO, recently presented at the CIBC Technology & Innovation Conference 5.0 in Toronto and at the Needham Emerging Technology Conference in New York. Find out how Absolute has transformed over the last year and how we’re solving the dark endpoint problem…
Although we’ve been around for a long time and our technology is embedded in the firmware of more than 1 billion endpoint devices, we’ve transformed our business in the last year — pivoting our product and focus, attracting top executives, re-investing in our team, and accelerating our research and development focus,
Geoff had the opportunity to tell the Absolute story at both the CIBC Technology & Innovation Conference and at the Needham Emerging Technology Conference recently — which included examining the evolving challenges in protecting data in the corporate environment.
The dark endpoint problem
Mobility, cloud technologies, and the Internet of Things (IoT) have changed the game. Today’s reality is that you can’t secure what you can’t see — and that’s where Absolute comes in.
“Traditional endpoint security is highly dependent on agents that are embedded on the endpoint, and there’s typically a stack of them,” said Geoff. “In healthcare, on average, there are 14 different agents on every endpoint, including management tools, anti-virus, encryption, VPN, containerization.”
The reality is that those agents are notoriously vulnerable, Geoff explained. “They get corrupted, they get compromised, they get disabled by users unintentionally or intentionally, they don’t get updated. And a significant percentage of them at any point in time are just not working, not doing what they’re supposed to do.” And that’s the crux of the dark endpoint problem.
“This combination of off-network devices and agents that have been disabled is creating this incredibly substantial blind spot that for enterprises that is emerging as a breeding ground for compromise or data breaches,” said Geoff.
How Absolute helps
Absolute helps organizations get total visibility into deployed devices — even if they’re off the network — as well as the data, applications and user behavior associated with those devices. We’re able to retrieve rich telemetry off of each endpoint, looking at the hardware and software on each device, looking for sensitive data, and looking at basic user behavior and characteristics. This information gives IT pros rich real-time context on each endpoint and its risk posture.
If a pre-defined level of risk is reached, we can do a number of things: Send a message, lock a device, restrict access to files, wipe the device, or launch an in-depth investigation to see if a device is being used as a vector in a broader enterprise attack.
Of course, visibility is only valuable if it is resilient. Thanks to our privileged position in the firmware of more than 1 billion devices, we can not only self-heal our own application, but also the other critical business applications that are installed on each endpoint. With malware and ransomware threats on the rise, the ability to quickly spot, remediate and contain threats is more valuable than ever. Questions about the future of Absolute technology? Contact us.