-

Absolute Security Showcases Next Generation Cyber Resilience at Black Hat USA 2024

New Remote Rehydration Capability Automates Recovery and Remediation for Ransomware, BSOD, and other Disruptions

SEATTLE & LAS VEGAS--(BUSINESS WIRE)--Absolute Security will demonstrate the next generation of Cyber Resilience at Black Hat USA 2024 in Las Vegas. During the conference, CISOs and other security and risk professionals responsible for protecting their organizations against threats and disruption are invited to hosted demonstrations of the Absolute Cyber Resilience Platform in the Business Expo Hall, booth #4312.

Entrenched remote and hybrid work models make it increasingly difficult for organizations to maintain visibility and control over PCs. AI and other innovations are requiring enterprises to accelerate new deployments and upgrades of millions of devices. Technical complexity and intensifying threats are disrupting business and causing security controls to fail at alarming rates. These and other factors are driving security and compliance risk to an all-time high.

The Absolute Cyber Resilience Platform is purpose-built to meet these challenges. Unique, firmware-based remote capabilities provide essential security, compliance, and business continuity benefits that modern enterprises need to thrive in today’s digital world. Visit the Absolute Security booth to learn more about key capabilities and benefits provided by the Absolute Cyber Resilience Platform, including:

  • Remote Endpoint Rehydration: Customers disrupted by Blue Screen of Death (BSOD) incidents, malware attacks, including ransomware, unauthorized access, other threats, and technical errors can detect and remove corrupted files and threats from devices, restore them to an operational state, and rehydrate the operating system and all security and productivity applications via a fully remote, one-click process.
  • Visibility and Control: Customers maintain constant visibility and control over PC fleets and receive comprehensive intelligence on device security posture to establish a Comply-to-Connect, Zero Trust model. This ensures that only endpoints compliant with security policies can connect to corporate networks, assets, and data.
  • Cyber Resilience: Customers ensure that endpoint security controls maintain efficacy and compliance with security policies. This not only reduces the risk of threat detection and prevention failures, but also stops unauthorized access attempts while maintaining resilient network connectivity.

“Accelerating threats, remote and hybrid work, complexity, and technical errors are causing crippling BSOD events and other costly disruptions,” said John Herrema, Chief Product Officer, Absolute Security. “Absolute’s unique cyber resilience capabilities are already embedded in more than half a billion leading PCs. Customers that have activated us are operating their businesses with the assurance that they’ve reduced the risk of being paralyzed by a costly outage or falling victim to a cyber attack.”

About Absolute Security

Absolute Security is partnered with more than 28 of the world’s leading endpoint device manufacturers, embedded in the firmware of 600 million devices, trusted by thousands of global enterprise customers, and licensed across 16 million PC users. With the Absolute Security Cyber Resilience Platform integrated into their digital enterprise, customers ensure their mobile and hybrid workforces connect securely and seamlessly from anywhere in the world and that business operations recover quickly following cyber disruptions and attacks. Our award-winning capabilities have earned recognition and leadership status across multiple technology categories, including Zero Trust Network Access (ZTNA), Endpoint Security, Security Service Edge (SSE), Firmware-Embedded Persistence, Automated Security Control Assessment (ASCA), and Zero Trust Platforms.

Absolute: We Make Security Work

Learn More: www.absolute.com. Follow Us: Blog | X | LinkedIn | Facebook | Instagram | YouTube

ABSOLUTE SECURITY, ABSOLUTE, the ABSOLUTE LOGO, AND NETMOTION are registered trademarks of Absolute Software Corporation ©2024, or its subsidiaries. All Rights Reserved. Other names or logos mentioned herein may be the trademarks of Absolute or their respective owners. The absence of the symbols and ® in proximity to each trademark, or at all, herein is not a disclaimer of ownership of the related trademark.

Contacts

Big Valley Marketing for Absolute | absolute@bigvalley.co

Absolute Security


Release Versions

Contacts

Big Valley Marketing for Absolute | absolute@bigvalley.co

Social Media Profiles
More News From Absolute Security

Absolute Security President & CEO Christy Wyatt Named Security Executive of the Year Finalist by SC Awards

SEATTLE--(BUSINESS WIRE)--Absolute Security, an enterprise cyber resilience leader, today announced that President & CEO Christy Wyatt is a Security Executive of the Year finalist in the 2026 SC Awards. The nomination reflects Wyatt's leadership in recognizing downtime as a global economic threat and her vision to help organizations quickly restore business operations after disruptive cyber incidents and massive systems failures. “The SC Awards celebrate excellence and innovation in cyberse...

News Media Alert: SC Media, CyberRisk Alliance, and Absolute Security Congratulate Inaugural Resilient CISO Award Finalists

SEATTLE & NEW YORK--(BUSINESS WIRE)--Absolute Security, an enterprise cyber resilience leader, with CyberRisk Alliance/SC Media, today announced finalists for the Resilient CISO Award, a new category in the prestigious SC Awards program. This distinction recognizes Chief Information Security Officers (CISOs) whose vision has expanded the scope of cybersecurity beyond traditional detection and prevention to also include being a driving force for cyber resilience, revenue protection, and stopping...

Cyber Incidents and Attacks Disrupt Enterprise Business Operations for Two Weeks, Reveals First Comprehensive Global Cyber Resilience Survey

SEATTLE--(BUSINESS WIRE)--Absolute Security today published the industry’s first comprehensive research revealing the state of enterprise Cyber Resilience. Among the top findings were that when hit with cyber incidents and attacks, some organizations experienced operational disruptions that lasted as long as two weeks, a majority faced downtime that lasted nearly five days, and none could recover business operations within a day. Cyber Resilience provides the ability to ensure defenses are oper...
Back to Newsroom