Self-healing endpoint and secure access solutions

Self-healing endpoint and secure access solutions

Share post

New additions to Absolute Software's Secure Access product line include a self-healing ZTNA client, resilient deployment architecture, and advanced network intelligence.

Absolute Software, a leading provider of self-healing endpoint and secure access solutions, today announced enhancements to its Secure Access product portfolio (formerly NetMotion by Absolute). These allow organizations to mitigate the risk of threats and further improve the user experience in work-from-anywhere environments. With this, Absolute offers a wide range of new product innovations, including self-healing Zero Trust Network Access (ZTNA), a robust deployment architecture and advanced network and ZTNA policy intelligence.

Self-healing Zero Trust Network Access (ZTNA)

"This release is an important milestone in our commitment to become the leading ZTNA solution for the borderless workplace, characterized by resiliency and reliability," said Joe Savarese, EVP of Secure Access Products at Absolute. “The results of our largest and most successful customer beta test to date confirm that these new features address urgent and important customer needs. As seamless, secure access has become imperative for the workplace without a perimeter, administrators need easy-to-deploy ZTNA solutions that offer both maximum security and an optimal user experience.”

Significant product improvements

These product enhancements enable IT and security professionals to protect critical infrastructure, applications, devices and data without impacting user productivity. Benefits include:

  • Ultra-Resilient ZTNA: Absolute's self-healing ZTNA client for Windows has the ability to automatically repair or reinstall itself if tampered with, accidentally removed, or otherwise inoperable. This ensures that it remains intact and delivers the full intended value.
  • Resilient Deployment Architecture: Absolute has added resiliency to its distributed network architecture with Active-Active Server technology. This brings the benefits of Software-as-a-Service (SaaS)—including high availability, scale-out, and zero-downtime upgrades—to customer-managed environments. This revolutionary approach enables individual system components to automatically repair themselves in the event of a failure. It ensures that other servers can step in when needed to avoid disruption or denial of service to end users—without administrator intervention.
  • Dynamic re-authentication and secure access enforcement: Customers can now more easily deploy modern cloud authentication solutions to mitigate the risk associated with compromised credentials. Enhancements include the ability to challenge a user's security credentials if conditions or the environment change and force them to re-authenticate via an existing method, including multi-factor authentication (MFA).
  • Foundational Zero Trust Security: New ZTNA policy actions strengthen the foundation of the Zero Trust security stance by enhancing employee protection from access to malicious applications and network targets and limiting lateral movement.
  • Enhanced Diagnostics and Monitoring Capabilities: In the most recent release, the company has enhanced its existing diagnostics and monitoring capabilities with the introduction of Absolute Insights for Network (formerly NetMotion Mobile IQ). This includes support for ARM devices for macOS and Windows, as well as advanced information for 5G networks (e.g. signal quality, network availability, network coverage and network utilization) and ZTNA policy enforcement (e.g. hosts/websites blocked by policy). , addresses/ports and web reputation). The aim is to minimize phishing, smishing and other malicious activities.
More at Absolute.com

 


About Absolute Software

Absolute Software accelerates its customers' transition to remote working with the industry's first self-healing Zero Trust platform that ensures maximum security and uncompromised productivity. Absolute is the only solution embedded in more than half a billion devices providing an always-on digital connection. It can intelligently and dynamically apply visibility, control, and self-healing capabilities to endpoints, applications, and network access to ensure cyber resiliency of distributed workspaces.


Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more