Today's News |
Absolute Announces Release of New Application Persistence Product
Friday, February 17, 2017Company Profile | Follow Company
Absolute Self-Healing Endpoint Security Provides Foundation for Uncompromised Visibility and Real-Time Remediation to Support Creation of United Front against Persistent Attackers and Insider Threats
Vancouver, BC, February 17, 2017--(T-Net)--Absolute, today announced the availability of its new Application Persistence product, making the self-healing endpoint a reality for the first time. Application Persistence enables IT and security leaders to ensure that critical endpoint management and security applications remain visible to IT departments and resilient to malicious attacks or insider threats.
Once the exclusive domain of Absolute's own cloud-based endpoint visibility and control platform, the new Application Persistence product provides embedded, self-healing capabilities to third-party endpoint controls such as VPN, anti-virus, encryption, systems management and other critical controls that are too easily compromised.
Application Persistence leverages Absolute's patented Persistence technology, embedded in the firmware of more than one billion popular PCs and mobile devices worldwide, giving enterprises and ISVs the power to build more resilient endpoints that self-heal if an application is removed or compromised, and ultimately return the endpoint to an original state of safety and efficacy without IT intervention.
Endpoint security technologies continue to rely on endpoint agents, which are notoriously vulnerable, and susceptible to being attacked or disabled. The vulnerability becomes exponential when the sheer number of agents per device is considered. According to an independent study from Ponemon institute1, nearly half of enterprises have six — to more than 10 endpoint agents — per device. The combination of agent vulnerability and volume creates a substantial blind spot for endpoint controls, and a breeding ground for security breaches.
“Organizations under constant attack demand a resilient self-healing endpoint defense,” said Christopher Bolin, Chief Product Officer, Absolute. “We believe the world is more secure when all endpoint agents can repair themselves. We are opening up our competitive advantage to empower third-party apps to self-heal, creating a united front against persistent attackers and insider threats. No other company can do this.”
Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, cites the dangers and implications of a dark endpoint in the enterprise, noting that 67 percent of enterprises are unable to detect employee use of insecure mobile devices. "There's nothing more concerning to a CISO than thousands of employees carrying laptops, smartphones and tablets around the globe — each containing sensitive and proprietary company data — and the IT department has no idea if a device has been compromised or not,” Ponemon said. “A dark endpoint is not only concerning, but it is also costly and dangerous.”
Application Persistence allows enterprises to harden much of their security stack, giving all of the agents on their endpoints the ability to self-heal or reinstall when attempts are made to break or compromise them. This ensures applications are always on - even if the machine is off the corporate network, the firmware is flashed, the device is re-imaged, the hard-drive is replaced, or the OS is reinstalled. It also gives enterprises complete control over endpoints, resulting in stronger, more resilient endpoint controls, uncompromised visibility and real-time remediation.
Absolute ISV partners can leverage Application Persistence to build-in greater resiliency and differentiate their own security and management applications, delivering increased customer value and safer environment for users and regulated data. Through the extensible Application Persistence framework, providers of business-critical applications can take advantage of the same firmware-embedded resiliency and visibility as Absolute's own platform.
Application Persistence is built on Absolute's patented Persistence technology to give IT operations and security professionals uncompromised visibility and control of applications and devices — whether the devices are on or off the corporate network — allowing companies to:
Application Persistence is currently available to the security industry ecosystem, including enterprises, security vendors, ISVs and OEMs worldwide. Several early-adopters in the healthcare, financial services, pharmaceuticals and manufacturing industries have already started integrating the technology into their applications. For more information, please visit: www.absolute.com/app
About Absolute
Absolute Software Corporation (TSX: ABT) is the industry standard in persistent endpoint security and data risk management solutions. Persistence® from Absolute provides organizations with visibility and control over all of their devices, regardless of user or location. If an Absolute client is removed from an endpoint, it will automatically reinstall so IT can secure each device and the sensitive data it contains. No other technology can do this. Persistence is embedded in the firmware of computers, netbooks, tablets and smartphones by global leaders, including Acer, ASUS, Dell, Fujitsu, HP, Lenovo, Microsoft, Panasonic, Samsung, and Toshiba, and the Company has reselling partnerships with these OEMs and others, including Apple. For more information about Absolute, visit www.absolute.com.
©2017 Absolute Software Corporation. All rights reserved. Absolute and Persistence are registered trademarks of Absolute Software Corporation. For patent information, visit www.absolute.com/patents. The Toronto Stock Exchange has neither approved nor disapproved of the information contained in this news release.
For more information, please contact:
Media and Analyst Relations
Darah Patton, InkHouse
absolute@inkhouse.com or 1 317 695 5630
Investor Relations
Joo-Hun Kim, MKR Group
joohunkim@mkrir.com or 1 212 868 6760
Other Recent Company News |
||||||||||||||||||||
|