Hi [[ session.user.profile.firstName ]]

Absolute

  • Date
  • Rating
  • Views
  • El nuevo estándar de seguridad: por qué la auto-recuperación es imperativa
    El nuevo estándar de seguridad: por qué la auto-recuperación es imperativa Juanma Rodriguez, Absolute Recorded: Sep 7 2017 61 mins
    Las estrategias tradicionales de protección de dispositivos están perdiendo la batalla. Los ataques son incesantes y cada vez más sofisticados. Esto ha aumentado la exigencia de los profesionales de seguridad y obliga a las empresas a adoptar nuevos paradigmas que faciliten que los sistemas se auto-recuperen. Para frenar las fugas de datos, debemos ser más inteligentes al detectar y responder a las amenazas.

    Este oportuno webinar de Absolute explora cómo conseguir que sus sistemas se auto-recuperen y que estén preparados para enfrentarse a amenazas cambiantes.
  • Introducing Absolute Reach: Complete Endpoint Visibility and Control
    Introducing Absolute Reach: Complete Endpoint Visibility and Control Phil Shomura, Absolute Recorded: Aug 29 2017 37 mins
    When endpoints go rogue or become invisible, you need to act quickly to protect your organization and mitigate risk. But with limited visibility and a lack of dependable deployment methods, that hasn’t always been possible—until now.

    Absolute Reach™, a flexible endpoint security feature within the Absolute Platform that gives you the power to execute custom discovery, compliance, and remediation tasks across 100% of your endpoints on-demand, anytime or anywhere:

    • Assess and enhance security posture: Always-on visibility and control—on and off the network
    • Eliminate blind spots: Remediate known vulnerabilities on the spot
    • Gather precise insights from any endpoint: Evaluate risk and prove compliance
    • Remediate with lightning speed: Script once. Deploy everywhere
    • Validate delivery for compliance assurance: Receive confirmation of successful delivery and execution

    Find out how to ensure protection in the event of emerging threats, such as ransomware and other endpoint vulnerabilities. Register for the webinar now.
  • The Cost of Insecure Endpoints – New Findings from Ponemon Institute
    The Cost of Insecure Endpoints – New Findings from Ponemon Institute Dr. Larry Ponemon, Chairman and Founder, Ponemon Institute & Richard Henderson, Global Security Strategist, Absolute Recorded: Jul 27 2017 64 mins
    Just how dangerous, inefficient, and ineffective are the endpoint security solutions used in most organizations today? Ponemon Institute independently surveyed hundreds of IT security professionals to find out — and are ready to share the surprising results in this important webinar.

    On July 27th, join founder and chairman, Dr. Larry Ponemon, and Richard Henderson, global security strategist at Absolute, for an interactive webinar on the results, including:

    • Exposing the largest dangers and greatest inefficiencies with endpoint security management today
    • Average financial and productivity costs associated with insecure systems – and how to mitigate in your organization
    • Steps you can take now to prevent attacks and stay compliant
  • GDPR: Global Implications of EU Legislation
    GDPR: Global Implications of EU Legislation Jonathan Armstrong, Cordery & Nima Baiati, Absolute Recorded: May 23 2017 62 mins
    Enforcement of the EU General Data Protection Regulation (GDPR) is looming, giving you less than 12 months to prepare. And it has major implications for every organization that processes EU personal data – regardless of where they are based.

    With the cost of non-compliance set at an astronomical 4% of global annual revenue – not to mention damage to reputation – the time to protect yourself is now.

    On May 23rd, join Absolute’s data protection experts alongside leading technology and compliance lawyer Jonathan Armstrong, as they share practical insights on the global implications of GDPR. Register today and learn:

    • GDPR compliance – what’s required and what’s at stake
    • Organizational steps you need to take now to avert disaster
    • The best security approaches to ensure compliance and protect your data – and your brand
  • The New Threshold of Comprehensive Security – Why Self-Healing is Imperative
    The New Threshold of Comprehensive Security – Why Self-Healing is Imperative Kim Ellery, Director, Product Marketing, Absolute Recorded: Mar 23 2017 30 mins
    Traditional strategies for protecting endpoints are failing as attacks increase in relentlessness and sophistication. This reality has elevated the demands on security professionals and requires that organizations adopt new security paradigms that unlock the power of self-healing systems. To stop security breaches at the source, we must become faster at intelligently detecting and responding to threats. This timely webinar from Absolute explores how to realize self-healing systems in your own organization and ensure preparedness in the face of evolving threats.
  • Forrester's Mastering The Endpoint: Addressing your core endpoint security needs
    Forrester's Mastering The Endpoint: Addressing your core endpoint security needs Chris Sherman, Senior Analyst at Forrester Research & Nima Baiati, Senior Director of Product Management at Absolute Recorded: Feb 9 2017 45 mins
    Security and risk professionals are dealing with staggering amounts of endpoint-related data loss and risk exposure. To help mitigate these risks, security pros need to rethink their current endpoint security strategies and move past traditional security technologies. Join guest speaker Chris Sherman, Senior Analyst at Forrester Research, as he discusses Forrester’s "Targeted-Attack Hierarchy of Needs”. In this webinar, he will highlight the core endpoint security needs critical to an enterprise security strategy. Attendees will learn how to deal with the multitude of threats targeting their user endpoints through a balance of attack surface reduction and threat detection, with orchestration and automation as key components.
  • Seeing the Forest and the Trees – Unique Security Challenges of Financial Data
    Seeing the Forest and the Trees – Unique Security Challenges of Financial Data Kim Ellery, Director, Product Marketing, Absolute Recorded: Jan 25 2017 28 mins
    Financial organizations are entrusted with the some of the most sensitive data and face a constant onslaught of attempts by insiders and hackers to steal incredibly valuable and easily monetized data. In this informative webinar, Kim Ellery, Director Product Marketing at Absolute, will discuss the increasing risk from both advanced attacks and insider threats. Attendees will gain actionable insights on how to balance the emphasis between detecting threats and preventing them in the first place, starting with visibility and actionable intelligence, to gain complete visibility and control of every endpoint device … no matter if they’re on or off the network.

    Join the Absolute team on January 25th for an informative webinar on improving your visibility, get actionable insights and strategies to help you detect threats faster or prevent them entirely
  • Eliminating security blind spots for Endpoints or on the move
    Eliminating security blind spots for Endpoints or on the move Kim Ellery, Director Product Marketing Recorded: Dec 13 2016 31 mins
    Just a few years ago it was all about keeping things out with traditional security focused on the perimeter. Today it’s a given that many risks have already made it past the front door – with the acceleration to the cloud combined with the exponential growth of mobility, sensitive data can be accessed from anywhere. This new reality has brought productivity gains but also a new landscape of risks. As a result, many organizations have upped their game, employing a strong playbook traversing from the endpoint to the cloud. This layered approach ensures organizations can tackle and respond to each play as it happens. Join Kim Ellery from Absolute for an insightful presentation on the strategic benefits of this new landscape, and why many organizations still miss critical security blind spots.
  • Why the user is the biggest gap in the layered security model
    Why the user is the biggest gap in the layered security model Geoff Glave, Senior Product Manager Recorded: Nov 15 2016 52 mins
    We’ve all witnessed the rapid deployment of security, apps, and layers of defense in a reactive effort to the exponential growth of mobile devices. However, a major element that is still overlooked is not the technology itself, it’s the user themselves. We all recount the tales of ‘user error’, regarded as an unintentional event that can have dire consequences. But often the intent can be malicious, with recent examples highlighting data leakage and device exploits backed by criminal or financial motives. Unfortunately, many existing security solutions are blind towards these activities, or in many cases credentials have been compromised and organizations aren’t aware until it’s too late. During this insightful presentation, learn how enterprises are leveraging unique technology combined with analytics to reduce the insider threat.

Embed in website or blog