Absolute Security Showcases Next Generation Cyber Resilience at Black Hat USA 2024
06 August 2024 - 12:30PM
Business Wire
New Remote Rehydration Capability Automates Recovery and
Remediation for Ransomware, BSOD, and other Disruptions
Absolute Security will demonstrate the next generation of Cyber
Resilience at Black Hat USA 2024 in Las Vegas. During the
conference, CISOs and other security and risk professionals
responsible for protecting their organizations against threats and
disruption are invited to hosted demonstrations of the Absolute
Cyber Resilience Platform in the Business Expo Hall, booth
#4312.
Entrenched remote and hybrid work models make it increasingly
difficult for organizations to maintain visibility and control over
PCs. AI and other innovations are requiring enterprises to
accelerate new deployments and upgrades of millions of devices.
Technical complexity and intensifying threats are disrupting
business and causing security controls to fail at alarming rates.
These and other factors are driving security and compliance risk to
an all-time high.
The Absolute Cyber Resilience Platform is purpose-built to meet
these challenges. Unique, firmware-based remote capabilities
provide essential security, compliance, and business continuity
benefits that modern enterprises need to thrive in today’s digital
world. Visit the Absolute Security booth to learn more about key
capabilities and benefits provided by the Absolute Cyber Resilience
Platform, including:
- Remote Endpoint Rehydration: Customers disrupted by Blue
Screen of Death (BSOD) incidents, malware attacks, including
ransomware, unauthorized access, other threats, and technical
errors can detect and remove corrupted files and threats from
devices, restore them to an operational state, and rehydrate the
operating system and all security and productivity applications via
a fully remote, one-click process.
- Visibility and Control: Customers maintain constant
visibility and control over PC fleets and receive comprehensive
intelligence on device security posture to establish a
Comply-to-Connect, Zero Trust model. This ensures that only
endpoints compliant with security policies can connect to corporate
networks, assets, and data.
- Cyber Resilience: Customers ensure that endpoint
security controls maintain efficacy and compliance with security
policies. This not only reduces the risk of threat detection and
prevention failures, but also stops unauthorized access attempts
while maintaining resilient network connectivity.
“Accelerating threats, remote and hybrid work, complexity, and
technical errors are causing crippling BSOD events and other costly
disruptions,” said John Herrema, Chief Product Officer, Absolute
Security. “Absolute’s unique cyber resilience capabilities are
already embedded in more than half a billion leading PCs. Customers
that have activated us are operating their businesses with the
assurance that they’ve reduced the risk of being paralyzed by a
costly outage or falling victim to a cyber attack.”
About Absolute Security
Absolute Security is partnered with more than 28 of the world’s
leading endpoint device manufacturers, embedded in the firmware of
600 million devices, trusted by thousands of global enterprise
customers, and licensed across 16 million PC users. With the
Absolute Security Cyber Resilience Platform integrated into their
digital enterprise, customers ensure their mobile and hybrid
workforces connect securely and seamlessly from anywhere in the
world and that business operations recover quickly following cyber
disruptions and attacks. Our award-winning capabilities have earned
recognition and leadership status across multiple technology
categories, including Zero Trust Network Access (ZTNA), Endpoint
Security, Security Service Edge (SSE), Firmware-Embedded
Persistence, Automated Security Control Assessment (ASCA), and Zero
Trust Platforms.
Absolute: We Make Security Work
Learn More: www.absolute.com. Follow Us: Blog | X | LinkedIn |
Facebook | Instagram | YouTube
ABSOLUTE SECURITY, ABSOLUTE, the ABSOLUTE LOGO, AND NETMOTION
are registered trademarks of Absolute Software Corporation ©2024,
or its subsidiaries. All Rights Reserved. Other names or logos
mentioned herein may be the trademarks of Absolute or their
respective owners. The absence of the symbols ™ and ® in proximity
to each trademark, or at all, herein is not a disclaimer of
ownership of the related trademark.
View source
version on businesswire.com: https://www.businesswire.com/news/home/20240806827400/en/
Big Valley Marketing for Absolute | absolute@bigvalley.co