recentpopularlog in

jonerp : absolute   7

How Absolute Protects Patient Data At Apria Healthcare
"Absolute’s dashboard provides Apria with both a snapshot of the status of all devices, updated every 15 minutes, as well as a complete device history that enables security managers to see and report on encryption, geolocation, and usage.

“Our geo-fencing is extremely tight. I have PCs that live in the Philippines. I have PCs that live in India. I have one, or actually two, PCs that live in Indonesia. If somebody goes from where they say that they’re going to be to another part of Indonesia, that device will freeze because that’s not where it’s supposed to be, and that’s an automatic thing. Don’t ask forgiveness, don’t ask questions, freeze the device, and see what happens. It’s one of the best things we’ve done for ourselves,” Janet Hunt recently said during a recent during a recent panel discussion. Geofencing is a must-have in any persistent endpoint security strategy."
business  featured  posts  technology  software  trends  &  concepts  absolute  2019  endpoint  security  report  persistence  resilience  apria  healthcare  cybersecurity  dell 
2 days ago by jonerp
Five Interesting Takeaways From RSA Conference 2020
"Cloud-based security information and event management (SIEM) systems capable of integrating with 3rd party public cloud platforms reflect the maturity nature of this market. Of the several vendors claiming to have cloud-based SIEM, Microsoft’s Azure Sentinel’s demo showed in real-time how fusion AI technology can parse large volumes of low fidelity signals into a few important incidents for SecOps teams to focus on. Microsoft said that in December 2019 alone, Azure Sentinel evaluated nearly 50 billion suspicious signals, isolating them down to just 25 high-confidence incidents for SecOps teams to investigate."
business  featured  posts  technology  software  trends  &  concepts  absolute  endpoint  security  api  centrify  pam  cetnrify  cybersecurity  louis  columbus'  blog 
13 days ago by jonerp
10 Ways Asset Intelligence Improves Cybersecurity Resiliency And Persistence
"Track, trace and find lost or stolen devices on or off an organizations’ network in real-time, disabling the device if necessary. Every device, from laptops, tablets, and smartphones to desktops and specialized use devices are another threat surface that needs to be protected."
business  featured  posts  technology  software  trends  &  concepts  absolute  persistence  platform  resilience  software’s  2019  endpoint  security  report  asset  intelligence 
9 weeks ago by jonerp
Why Cybersecurity Needs To Focus More On Customer Endpoints
"There are over thirty vendors competing in the endpoint security market right now. A few of the most interesting are Absolute Software, Microsoft, Palo Alto Networks, and others who are seeing a surge of activity from enterprises based on discussions with CIOs and CISOs. Absolute Software’s Persistence self-healing endpoint security technology is embedded in the firmware of more than 500 million devices and gives CIOs, CISOs and their team’s complete visibility and control over devices and data. Absolute is the leading visibility and control platform that provides enterprises with tamper-proof resilience and protection of all devices, data, and applications."
business  featured  posts  technology  software  trends  &  concepts  absolute  persistence  resilience  (tse:  abt)  asset  management  christy  wyatt  ceo  of  cloud-based  endpoint  protection  platforms  (epp) 
december 2019 by jonerp
Improving Endpoint Security Needs To Be A Top Goal In 2020
"Cyberattacks are growing more complex and difficult to prevent now and will accelerate in the future, making endpoint security a top goal in 2020. Cybercriminals are using structured and unstructured machine learning algorithms to hack organizations’ endpoints with increasing frequency. Endpoint attacks and their levels of complexity will accelerate as cybercriminals gain greater mastery of these techniques."
business  featured  posts  technology  software  trends  &  concepts  absolute  absolute’s  2019  endpoint  security  report  cyberattacks  cybersecurity 
november 2019 by jonerp
5 Key Insights From Absolute’s 2019 Endpoint Security Trends Report
"Endpoint security controls and their associated agents degrade and lose effectiveness over time. Over 42% of endpoints experience encryption failures, leaving entire networks at risk from a breach. They’re most commonly disabled by users, malfunction or have error conditions or have never been installed correctly in the first place. Absolute found that endpoints often failed due to the fragile nature of their encryption agents’ configurations. 2% of encryption agents fail every week, and over half of all encryption failures occurred within two weeks, fueling a constant 8% rate of decay every 30 days. 100% of all devices experiencing encryption failures within one year.'
business  featured  posts  technology  software  trends  &  concepts  absolute  security  cybersecurity  endpoint  louis  columbus'  blog 
september 2019 by jonerp
Why AI Is The Future Of Cybersecurity
"Fraud detection, malware detection, intrusion detection, scoring risk in a network, and user/machine behavioral analysis are the five highest AI use cases for improving cybersecurity. Capgemini analyzed 20 use cases across information technology (IT), operational technology (OT) and the Internet of Things (IoT) and ranked them according to their implementation complexity and resultant benefits (in terms of time reduction). Based on their analysis, we recommend a shortlist of five high-potential use cases that have low complexity and high benefits. 54% of enterprises have already implemented five high impact cases. The following graphic compares the recommended use cases by the level of benefit and relative complexity."
business  featured  posts  technology  software  trends  &  concepts  absolute  ai  centrify  cybersecurity  kount  louis  columbus'  blog  mobileiron 
july 2019 by jonerp

Copy this bookmark:

to read