-

Absolute Security Showcases Next Generation Cyber Resilience at Black Hat USA 2024

New Remote Rehydration Capability Automates Recovery and Remediation for Ransomware, BSOD, and other Disruptions

SEATTLE & LAS VEGAS--(BUSINESS WIRE)--Absolute Security will demonstrate the next generation of Cyber Resilience at Black Hat USA 2024 in Las Vegas. During the conference, CISOs and other security and risk professionals responsible for protecting their organizations against threats and disruption are invited to hosted demonstrations of the Absolute Cyber Resilience Platform in the Business Expo Hall, booth #4312.

Entrenched remote and hybrid work models make it increasingly difficult for organizations to maintain visibility and control over PCs. AI and other innovations are requiring enterprises to accelerate new deployments and upgrades of millions of devices. Technical complexity and intensifying threats are disrupting business and causing security controls to fail at alarming rates. These and other factors are driving security and compliance risk to an all-time high.

The Absolute Cyber Resilience Platform is purpose-built to meet these challenges. Unique, firmware-based remote capabilities provide essential security, compliance, and business continuity benefits that modern enterprises need to thrive in today’s digital world. Visit the Absolute Security booth to learn more about key capabilities and benefits provided by the Absolute Cyber Resilience Platform, including:

  • Remote Endpoint Rehydration: Customers disrupted by Blue Screen of Death (BSOD) incidents, malware attacks, including ransomware, unauthorized access, other threats, and technical errors can detect and remove corrupted files and threats from devices, restore them to an operational state, and rehydrate the operating system and all security and productivity applications via a fully remote, one-click process.
  • Visibility and Control: Customers maintain constant visibility and control over PC fleets and receive comprehensive intelligence on device security posture to establish a Comply-to-Connect, Zero Trust model. This ensures that only endpoints compliant with security policies can connect to corporate networks, assets, and data.
  • Cyber Resilience: Customers ensure that endpoint security controls maintain efficacy and compliance with security policies. This not only reduces the risk of threat detection and prevention failures, but also stops unauthorized access attempts while maintaining resilient network connectivity.

“Accelerating threats, remote and hybrid work, complexity, and technical errors are causing crippling BSOD events and other costly disruptions,” said John Herrema, Chief Product Officer, Absolute Security. “Absolute’s unique cyber resilience capabilities are already embedded in more than half a billion leading PCs. Customers that have activated us are operating their businesses with the assurance that they’ve reduced the risk of being paralyzed by a costly outage or falling victim to a cyber attack.”

About Absolute Security

Absolute Security is partnered with more than 28 of the world’s leading endpoint device manufacturers, embedded in the firmware of 600 million devices, trusted by thousands of global enterprise customers, and licensed across 16 million PC users. With the Absolute Security Cyber Resilience Platform integrated into their digital enterprise, customers ensure their mobile and hybrid workforces connect securely and seamlessly from anywhere in the world and that business operations recover quickly following cyber disruptions and attacks. Our award-winning capabilities have earned recognition and leadership status across multiple technology categories, including Zero Trust Network Access (ZTNA), Endpoint Security, Security Service Edge (SSE), Firmware-Embedded Persistence, Automated Security Control Assessment (ASCA), and Zero Trust Platforms.

Absolute: We Make Security Work

Learn More: www.absolute.com. Follow Us: Blog | X | LinkedIn | Facebook | Instagram | YouTube

ABSOLUTE SECURITY, ABSOLUTE, the ABSOLUTE LOGO, AND NETMOTION are registered trademarks of Absolute Software Corporation ©2024, or its subsidiaries. All Rights Reserved. Other names or logos mentioned herein may be the trademarks of Absolute or their respective owners. The absence of the symbols and ® in proximity to each trademark, or at all, herein is not a disclaimer of ownership of the related trademark.

Contacts

Big Valley Marketing for Absolute | absolute@bigvalley.co

Absolute Security


Release Versions

Contacts

Big Valley Marketing for Absolute | absolute@bigvalley.co

Social Media Profiles
More News From Absolute Security

Cyber Incidents and Attacks Disrupt Enterprise Business Operations for Two Weeks, Reveals First Comprehensive Global Cyber Resilience Survey

SEATTLE--(BUSINESS WIRE)--Absolute Security today published the industry’s first comprehensive research revealing the state of enterprise Cyber Resilience. Among the top findings were that when hit with cyber incidents and attacks, some organizations experienced operational disruptions that lasted as long as two weeks, a majority faced downtime that lasted nearly five days, and none could recover business operations within a day. Cyber Resilience provides the ability to ensure defenses are oper...

SC Media and CyberRisk Alliance Introduce the Inaugural Resilient CISO Award

SEATTLE & NEW YORK--(BUSINESS WIRE)--Absolute Security, an enterprise cyber resilience leader, with CyberRisk Alliance/SC Media, today introduced the Resilient CISO Award, a new category in the prestigious SC Awards program. This distinction will recognize Chief Information Security Officers (CISOs) who are demonstrating success in leading strategies that not only defend their organizations against threats and risk but also stop downtime to rapidly restore operational continuity following secur...

Absolute Security Named Only Leader and Outperformer in GigaOm Radar for Patch Management

SEATTLE--(BUSINESS WIRE)--Absolute Security Speeds Patching, Helping Customers Defend Against Ransomware, Protect Against Risk, and Stop Downtime Caused by Vulnerable Software...
Back to Newsroom