Strengthen resilience against cyber attacks

Strengthen resilience against cyber attacks

Share post

A leading provider of self-healing, intelligent security solutions, has announced the further expansion of its ecosystem of Absolute Application Resilience.

Joint customers can now apply Absolute's firmware-embedded persistence technology to improve the resiliency of more than 80 mission-critical security and business applications. Recent additions include NetSfere, ActivTrak Agent, HP TechPulse, Dell SupportAssist, Symantec Management Agent, BUFFERZONE Safe Workspace, Octopus Pro and Syxsense Responder.

Robust security controls

With cybersecurity risks and disruptions rising at an alarming rate, there is an urgent need for robust security controls that can effectively protect an organization's most vulnerable assets: users, their devices, and data. In everyday practice, however, maintaining the functionality of the applications, including their security, across widely distributed locations is associated with extensive problems and requirements. Absolute's Resilience Index 2023 report found that seven out of 80 popular security applications worked effectively on less than 47 percent of the devices they were installed on — and in some special cases as little as 52 percent. In contrast, when Absolute Application Resilience's self-healing capabilities were enabled, application health and effectiveness improved by up to XNUMX percentage points across the same vendors.

Application resilience

As a result of increased demand, Absolute has seen a 18 percent increase in the number of customers adopting Application Resilience over the past 79 months. These customers increasingly want to monitor the health of their business-critical applications and, if necessary, be able to repair or reinstall them themselves.

John Herrema, Absolute's EVP of Product and Strategy, explains: “Our mission is to enable our customers to increase their resilience against cyber attacks. We are committed to ensuring that the security features actually work. And because of our unique position of being embedded in firmware and our self-healing capabilities, we're uniquely qualified to do so. By continuously expanding our ecosystem for application resilience, we enable companies to continue to expand their security and business tools. In this way we ensure that they remain stable and can work effectively.”

strengthen security measures

The launch of the White House National Cyber ​​Security Strategy earlier this year has also underlined the need for both companies and software vendors to strengthen security measures. This strategy aims to support security and resilience by shifting secure development practices and liability for software products and services directly to the digital ecosystem. "This will put companies in the best position to reduce risk to their business," Absolute said.

Herrema adds: “We believe that shared responsibility can also be the key to closing security and reliability gaps. Our data proves time and time again that even the most advanced applications can be corrupted by events such as wear and tear, unintentional tampering, or malicious acts. Both companies and software providers should therefore be aware of the enormous complexity of applications, devices and networks. They depend on successful installations and ongoing operations, and they must consistently take the right steps to ensure the resilience of these applications and protect them from these complex environments.”

More at AbsoluteSoftware.com

 


About Absolute Software

Absolute Software accelerates its customers' transition to remote working with the industry's first self-healing Zero Trust platform that ensures maximum security and uncompromised productivity. Absolute is the only solution embedded in more than half a billion devices providing an always-on digital connection.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more