Absolute Provides Targeted Meltdown and Spectre Risk Assessment Automation to Speed Vulnerability Remediation and Protect Data

Ad blocking detected

Thank you for visiting CanadianInsider.com. We have detected you cannot see ads being served on our site due to blocking. Unfortunately, due to the high cost of data, we cannot serve the requested page without the accompanied ads.

If you have installed ad-blocking software, please disable it (sometimes a complete uninstall is necessary). Private browsing Firefox users should be able to disable tracking protection while visiting our website. Visit Mozilla support for more information. If you do not believe you have any ad-blocking software on your browser, you may want to try another browser, computer or internet service provider. Alternatively, you may consider the following if you want an ad-free experience.

Canadian Insider Club
$299/ year*
Daily Morning INK newsletter
+3 months archive
Canadian Market INK weekly newsletter
+3 months archive
30 publication downloads per month from the PDF store
Top 20 Gold, Top 30 Energy, Top 40 Stock downloads from the PDF store
All benefits of basic registration
No 3rd party display ads
JOIN THE CLUB

* Price is subject to applicable taxes.

Paid subscriptions and memberships are auto-renewing unless cancelled (easily done via the Account Settings Membership Status page after logging in). Once cancelled, a subscription or membership will terminate at the end of the current term.

Jan 11, 2018 08:30 am
VANCOUVER, British Columbia -- 

Absolute, the endpoint visibility and control company, today announced new additions to the Absolute Reach Library, including automated risk assessment tools to mitigate the business risk of new Meltdown and Spectre vulnerabilities. Absolute Reach provides organizations with the situational awareness to identify vulnerable endpoints — on- and off- the corporate network — and protect data, guiding customers through appropriate remediation and prevention steps.

Same day response to high priority endpoint vulnerabilities is increasingly critical as organizations work to reduce risks to sensitive data and brand reputation. As threats like Meltdown and Spectre emerge, Absolute’s rapid response team assesses the technical details of the event, developing targeted risk assessment and remediation tools that have been validated to help organizations reduce their exposure. These automated workflows are made available to customers via the Absolute Reach library, accelerating time to remediate and arming security staff with automated workflows to mitigate risks and protect data.

“IT security professionals must act quickly and with certainty to ensure data, devices and applications are secure as new cyber threats emerge,” said Dean Ćoza, Executive Vice President of Products. “The time-sensitive fight to contain vulnerabilities such as Spectre and Meltdown is often delayed due to a lack of technical expertise and instrumentation. With the power of Absolute Reach, customers can now expedite their adaptive endpoint protection with minimal effort by leveraging Absolute Reach. In addition, Absolute’s patented Persistence technology enables this technology to be deployed on all endpoints, including dark endpoints, filling a crucial security blind spot.”

As threats evolve, users can follow the prompt-driven Absolute Reach wizard to query and remediate endpoint vulnerabilities using authenticated workflows — all based on the collective intelligence of experienced security experts who have addressed the issue successfully. Following remediation, users can instantly validate that all endpoints are secure and compliant. Watch this demo to see how Absolute Reach and the growing library of automated workflows helps users assess and remediate security vulnerabilities such as Spectre and Meltdown.

Absolute Reach provides the actionable and authenticated automation IT and security teams at all skill levels need to:

  • Significantly reduce endpoint query and remediation time requirements.
  • Intuitively apply remedial actions across an entire endpoint population with a few clicks.
  • Collect deeper insights for compliance — e.g., assess exposure to new vulnerabilities.
  • Leverage hundreds of other IT asset and security workflows — such as patch status, power configuration settings, application installation/removal and wireless configuration updates.
  • Avoid the need to modify workflows for their environment or limit the deployment to only on-network devices, a common challenge for administrators using other community scripting resources and tools.

To remain safe and resilient in the face of security vulnerabilities, customers can also extend Absolute’s self-healing Application Persistence to complementary endpoint controls such as CrowdStrike, Carbon Black, Cylance and other agents. Application Persistence prevents additional security posture gaps by monitoring current status and blocking attempts to exploit vulnerabilities.

To learn more about how the automated workflows available with Absolute Reach can help you assess and remediate security vulnerabilities, eliminate blind spots, and ensure compliance, visit www.absolute.com/reach.

About Absolute

Absolute set the new standard for endpoint visibility and control with self-healing endpoint security and always-connected IT asset management to protect devices, data, applications and users — on and off the network. Bridging the gap between security and IT operations, only Absolute gives enterprises visibility they can act on to protect every endpoint, remediate vulnerabilities and ensure compliance in the face of insider and external threats. Absolute’s patented Persistence technology is already embedded in the firmware of more than one billion PCs and mobile devices, and is trusted by over 15,000 customers worldwide. For the latest information, visit www.absolute.com and follow us at @absolutecorp.

©2018 Absolute Software Corporation. All rights reserved. Absolute and Persistence are registered trademarks of Absolute Software Corporation. For patent information, visit www.absolute.com/patents. The Toronto Stock Exchange has neither approved nor disapproved of the information contained in this news release.

Media and Analyst Relations
InkHouse
Darah Patton, 317-695-5630
absolute@inkhouse.com
or
Investor Relations
MKR Group
Joo-Hun Kim, 212-868-6760
joohunkim@mkrir.com

Comment On!

140
Upload limit is up to 1mb only
To post messages to your Socail Media account, you must first give authorization from the websites. Select the platform you wish to connect your account to CanadianInsider.com (via Easy Blurb).