TMCnet News
Absolute Application Persistence Product Extends Embedded Self-Healing Capabilities to Third-Party Endpoint Security and Management ApplicationsAbsolute® today announced the availability of its Application Persistence product, making the self-healing endpoint a reality for the first time. Application Persistence enables IT and security leaders to ensure that critical endpoint management and security applications remain visible to IT departments and resilient to malicious attacks or insider threats. Once the exclusive domain of Absolute's own cloud-based endpoint visibility and control platform, the new Application Persistence product provides embedded, self-healing capabilities to third-party endpoint controls such as VPN, anti-virus, encryption, systems management and other critical controls that are too easily compromised. Application Persistence leverages Absolute's patented Persistence® technology, embedded in the firmware of more than one billion popular PCs and mobile devices worldwide, giving enterprises and ISVs the power to build more resilient endpoints that self-heal if an application is removed or compromised, and ultimately return the endpoint to an original state of safety and efficacy without IT intervention. Endpoint security technologies continue to rely on endpoint agents, which are notoriously vulnerable, and susceptible to being attacked or disabled. The vulnerability becomes exponential when the sheer number of agents per device is considered. According to an independent study from Ponemon institute1, nearly half of enterprises have six -- to more than 10 endpoint agents -- per device. The combination of agent vulnerability and volume creates a substantial blind spot for endpoint controls, and a breeding ground for security breaches. "Organizations under constant attack demand a resilient self-healing endpoint defense," said Christopher Bolin, Chief Product Officer, Absolute. "We believe the world is more secure when all endpoint agents can repair themselves. We are opening up our competitive advantage to empower third-party apps to self-heal, creating a united front against persistent attackers and insider threats. No other company can do this." Dr. Larry Ponemon, chairman and founder of the Ponemon Institute (News - Alert), cites the dangers and implications of a dark endpoint in the enterprise, noting that 67 percent of enterprises are unable to detect employee use of insecure mobile devices. "There's nothing more concerning to a CISO than thousands of employees carrying laptops, smartphones and tablets around the globe -- each containing sensitive and proprietary company data - and the IT department has no idea if a device has been compromised or not," Ponemon said. "A dark endpoint is not only concerning, but it is also costly and dangerous."
Application Persistence for
Enterprises and ISVs Absolute ISV partners can leverage Application Persistence to build-in greater resiliency and differentiate their own security and management applications, delivering increased customer value and safer environment for users and regulated data. Through the extensible Application Persistence framework, providers of business-critical applications can take advantage of the same firmware-embedded resiliency and visibility as Absolute's own platform.
Self-Healing Endpoints Protect the Digital
Enterprise, at Risk Data and Critical IP Assets
The company will demonstrate Application Persistence in the Absolute booth (#S2427) at the upcoming RSA (News - Alert) Conference in San Francisco, scheduled for February 14-17, 2017.
Availability
About Absolute
Citation: ©2017 Absolute Software Corporation. All rights reserved. Absolute and Persistence are registered trademarks of Absolute Software Corporation. For patent information, visit www.absolute.com/patents. The Toronto Stock Exchange has neither approved nor disapproved of the information contained in this news release.
View source version on businesswire.com: http://www.businesswire.com/news/home/20170207005656/en/ |