Hardware Plays Critical Role in Strengthening CybersecurityBy Cinthya Alaniz Salazar | Tue, 02/22/2022 - 10:03
Q: How did the acquisition of NetMotion complemented Absolute’s software security solutions?
A: NetMotion’s zero-trust network access and enterprise-grade VPN offering has enhanced Absolute’s self-healing security solutions by enabling greater infrastructure penetration for the next generation of endpoint resilience. The combination of these two solutions provides our clients a secure user experience while minimizing the strain on IT and security teams, maximizing functionality and strengthening overall security posture.
Q: How does uncompromised visibility help companies and public institutions minimize cybersecurity threats?
A: Absolute’s premise is that you cannot protect what you cannot see, a complicated task in an age when cloud services have multiplied the number of endpoints and the risk surface. This is discounting natural human error, predictable corruption or failure of controls and applications over time, which are part of any business. Effectively, allowing Absolute to have real-time and uncompromised visibility over our clients’ structures enables us to locate and spotlight threats, even in dark endpoints and devices so that companies can both understand the threat and respond immediately.
Q: What is a self-healing endpoint and how does it make Absolute a leader in zero-trust security frameworks?
A: Absolute’s security software solutions are a market singularity because they are the only ones complemented by the Persistence hardware, which is embedded in the motherboard's non-volatile memory and cannot be deleted or altered without damaging the physical product. Once a client purchases our service license, the Persistence agent activates from within the hardware from where it cannot be corrupted or deleted because it will automatically “heal” or reinstall itself.
This automatic component of our security solution is essential to create a zero-trust environment because it removes the possibility of selective application, regardless of who is handling the device or overseeing the network infrastructure.
Q: How do you integrate third-party software into your solutions without compromising their effectiveness?
A: Rather than compromising the effectiveness of third-party solutions or applications, Absolute’s Persistence hardware plays a critical role in supplementing their effectiveness. We allied with companies like Avanti and FireEye for this reason and we will continue to work together on advancing cybersecurity solutions that meet the challenges of an ever-evolving digital landscape.
Q: What is Absolute’s approach to addressing human-error and promoting awareness among your clients?
A: Human-error is responsible for 70 percent of data breaches, which normally stem from lack of awareness of ransomware schemes, which can present as phishing emails, fake security software and even strategically abandoned USB ports. In other words, companies should have a vested interest in addressing their highest risk-surface at the source. Human errors can be easily circumvented with cybersecurity educational training and protocols. Moreover, malware campaigns are increasingly sophisticated, so education should be cyclical as new threat patterns emerge.
In an increasingly digital hybrid world, cybersecurity should be considered a shared responsibility, from C-suite executives and IT management to front-desk employees.
Q: What is your sense of client awareness related to “safe deleting” even in decommissioned equipment?
A: Absolute security solutions are among the select few that can continue running even if the device is offline, which is enabled by the hardware component embedded in the devices’ motherboard. Our solution will behave or react according to the guidelines established by our clients. For example, if a client asks to block the functionality of a device in 30 days for an employee, even if the device is not connected to any network or that employee attempts to delete the software, Absolute will still be able to disable the device.