Absolute Detects At-Risk Data Stored on 'Shadow IT' Cloud Applications

Ad blocking detected

Thank you for visiting CanadianInsider.com. We have detected you cannot see ads being served on our site due to blocking. Unfortunately, due to the high cost of data, we cannot serve the requested page without the accompanied ads.

If you have installed ad-blocking software, please disable it (sometimes a complete uninstall is necessary). Private browsing Firefox users should be able to disable tracking protection while visiting our website. Visit Mozilla support for more information. If you do not believe you have any ad-blocking software on your browser, you may want to try another browser, computer or internet service provider. Alternatively, you may consider the following if you want an ad-free experience.

Canadian Insider Club
$299/ year*
Daily Morning INK newsletter
+3 months archive
Canadian Market INK weekly newsletter
+3 months archive
30 publication downloads per month from the PDF store
Top 20 Gold, Top 30 Energy, Top 40 Stock downloads from the PDF store
All benefits of basic registration
No 3rd party display ads
JOIN THE CLUB

* Price is subject to applicable taxes.

Paid subscriptions and memberships are auto-renewing unless cancelled (easily done via the Account Settings Membership Status page after logging in). Once cancelled, a subscription or membership will terminate at the end of the current term.

Absolute Detects At-Risk Data Stored on 'Shadow IT' Cloud Applications

Canada NewsWire

VANCOUVER, Aug. 10, 2016 /CNW/ - Absolute® (TSX: ABT), the industry standard for persistent endpoint security and data risk management solutions, today introduced functionality that detects data at risk on endpoints associated with cloud storage applications. This new capability allows organizations to remotely secure data stored in the cloud and beyond the corporate network.

Cloud storage applications are often used by employees to store and share corporate data with other employees. Considered 'Shadow IT' by many organizations, this behavior can contravene internal data security policies since the data is hosted outside the corporate network and beyond the reach of IT, making it impossible to monitor and maintain visibility over sensitive information.

With the latest release of Absolute Data & Device Security (DDS), users can determine which cloud applications are being used and what information is being stored, including the discovery of sensitive data using Absolute's innovative Endpoint Data Discovery capability.

Leveraging Persistence® technology from Absolute, organizations can detect folders on devices associated with cloud storage applications, identify at-risk data such as PHI, PII, payment information or intellectual property, and remotely delete sensitive data – even if an endpoint is off the corporate network.

"Unsanctioned use of cloud storage applications represents a substantial threat to organizations since sensitive material can be transferred within applications where IT has no visibility," said Christopher Bolin, Chief Product Officer, Absolute. "This reporting capability extends awareness and visibility across all devices and data – including data stored within cloud applications. We will provide our customers with detailed insight to which applications are in use and provide them with the ability to secure and delete sensitive data that's been stored in this manner."

Availability
These capabilities are available today with the latest version of Absolute DDS. For more details, watch a video about Endpoint Data Discovery or read a white paper which outlines strategies to mitigate the risks of data stored in unauthorized cloud storage applications.

About Absolute

Absolute Software Corporation (TSX: ABT) is the industry standard in persistent endpoint security and data risk management solutions. Persistence® technology from Absolute provides organizations with visibility and control over all of their devices, regardless of user or location. If an Absolute client is removed from an endpoint, it will automatically reinstall so IT can secure each device and the sensitive data it contains. No other technology can do this. Persistence technology is embedded in the firmware of computers, netbooks, tablets and smartphones by global leaders, including Acer, ASUS, Dell, Fujitsu, HP, Lenovo, Microsoft, Panasonic, Samsung, and Toshiba, and the Company has reselling partnerships with these OEMs and others, including Apple. For more information about Absolute, visit www.absolute.com.

©2016 Absolute Software Corporation. All rights reserved. Absolute and Persistence are registered trademarks of Absolute Software Corporation. For patent information, visit www.absolute.com/patents. The Toronto Stock Exchange has neither approved nor disapproved of the information contained in this news release.

SOURCE Absolute Software Corporation

Copyright CNW Group 2016

Comment On!

140
Upload limit is up to 1mb only
To post messages to your Socail Media account, you must first give authorization from the websites. Select the platform you wish to connect your account to CanadianInsider.com (via Easy Blurb).