Hi [[ session.user.profile.firstName ]]

Absolute Software

  • Date
  • Rating
  • Views
  • 7 Steps to Protecting Data in the Era of Digital Care
    7 Steps to Protecting Data in the Era of Digital Care Dave Shackleford | SANS Institute & Josh Mayfield | Absolute Recorded: Aug 20 2018 62 mins
    Healthcare is data. Every stitch of a patient’s health record, diagnoses, treatments, and provider interactions are fueled by information.

    And with PHI, IP, and other sensitive information readily accessible on all types of devices, it’s no wonder that healthcare and life sciences organizations are now prime targets for cyber criminals.

    In this webinar, you’ll drop in on a conversation between Dave Shackleford, Analyst and Senior Instructor at SANS Institute; and Absolute’s Josh Mayfield, Director of Solutions. They will discuss the key steps required to keep sensitive healthcare data safe and avoid disastrous data breaches.

    You will learn:

    - How to pinpoint sensitive data — even if it’s hiding on lost or stolen devices
    - Which bad endpoint hygiene habits are making your devices vulnerable to attacks
    - The cost of not complying with shifting regulations and OCR requirements

    About the Speakers:

    JOSH MAYFIELD | Director of Security Strategy | Absolute
    DAVE SHACKLEFORD | Analyst @ Voodoo Consulting | Senior Instructor and Course author @ SANS Institute
  • Data Visibility: Your Path to Regulatory Compliance
    Data Visibility: Your Path to Regulatory Compliance Kim Ellery - Senior Director of Product Marketing | Absolute Recorded: Jul 10 2018 45 mins
    Whether for GDPR, HIPAA, or other regulations, successful compliance initiatives require knowing the location of your sensitive information.

    But with mobile workforces equipped with devices that go off-network every day, is that even possible? For most organizations, the reality is that critical data resides on endpoints they can’t see or secure.

    Watch “Data Visibility: Your Path to Regulatory Compliance” now and understand the steps you need to take to:

    • Identify which of your endpoints contain sensitive information
    • Understand your at-risk data to determine cost of exposure
    • Ensure continuous compliance through rapid remediation
    • Prove compliance should an incident occur

    Make sure your organization is always audit-ready, and avoid data breaches and compliance-related penalties.
  • Nailing it! 5 Ways to Win with the NIST Cybersecurity Framework
    Nailing it! 5 Ways to Win with the NIST Cybersecurity Framework Renee Murphy | Forrester & Josh Mayfield | Absolute Recorded: Jun 21 2018 64 mins
    The NIST Cybersecurity Framework (CSF) is the chosen path for thousands of organizations. Why? Because resilience is their most critical need in the face of changing threats, ever-present vulnerabilities, and a sprawling attack surface. NIST CSF provides a blueprint for cyber resilience. But turning theory into reality can be a challenge.

    In this webinar, you’ll drop in on a conversation between our featured guest, Forrester’s Renee Murphy, Principal Analyst for Security and Risk; and Absolute’s Josh Mayfield, Director of Solutions. They will discuss the clear and tangible steps at work within leading organizations pursuing NIST CSF.

    You will gather insights and avoid the pitfalls with your rollout of NIST CSF, including how to:
    1- Identify endpoint devices: on and off network
    2- Validate configurations for optimal data protection
    3- Detect compliance drift within your endpoint population
    4- Respond to endpoint security incidents
    5- Recover from security incidents and iterate for continuous compliance


    Featured Speakers:
    - Renee Murphy | Principal Analyst for Security and Risk Professionals | Forrester
    - Josh Mayfield | Director of Solutions | Absolute
  • Total Economic Impact of Endpoint Security, featuring Forrester
    Total Economic Impact of Endpoint Security, featuring Forrester Chris Sherman, Senior Analyst at Forrester Research & Chris Schmidt, Director of IT at Greenville Health System Recorded: Mar 29 2018 55 mins
    What is the real value of deploying an endpoint visibility and control platform? Which benefits and risks should your organization anticipate?

    That’s what we commissioned Forrester Consulting to quantify for The “Total Economic Impact™ of the Absolute Platform,” a 2018 study.

    Our guest speaker Forrester Analyst Chris Sherman co-presents the results, and examines the benefits of deploying the Absolute platform for endpoint and data security, compliance, and remediation, in typical organizations as found in the commissioned study. In addition, Chris Schmidt, Director of IT at Greenville Health System is sharing first-hand experience deploying Absolute,

    Join us as we uncover:
    - Key challenges faced by organizations and the results they achieved
    - Current trends within the Endpoint Visibility and Control landscape
    - How automation of IT tasks can provide significant efficiency gains
    - The total economic benefit of the Absolute platform, including 146% ROI and payback in six months

    Watch now to better understand the financial and business benefits that can be realized by the Absolute platform.

    Guest Speakers:
    > Chris Sherman - Senior Analyst | Forrester Research
    > Chris Schmidt - Director of IT | Greenville Health System
    Host: Kim Ellery - Senior Director, Product Marketing | Absolute
  • Four Essential Strategies for Endpoint Security and Protection
    Four Essential Strategies for Endpoint Security and Protection Richard Henderson, Global Security Strategist, Absolute Recorded: Feb 22 2018 62 mins
    When it comes to endpoint security, the playing field has changed. Threats are more dangerous and prevalent than ever before. Global security standards are more rigid, and the penalties for non-compliance more severe. Yesterday’s security strategy isn’t going to protect you from tomorrow’s attacks.

    Register now for this important webinar that takes a deep dive into the four essential strategies for endpoint security and protection. Featuring Richard Henderson, Global Security Strategist at Absolute, you’ll learn how to:

    • Get ahead of threats and prevent incidents before they happen
    • Implement continuous assessment for regulatory compliance
    • Dramatically minimize risk through effective technologies and processes should an incident occur

    Learn the key strategies for building and maintaining a comprehensive ecosystem of management and security controls for all of your endpoints. Register to watch this webinar now.
  • El nuevo estándar de seguridad: por qué la auto-recuperación es imperativa
    El nuevo estándar de seguridad: por qué la auto-recuperación es imperativa Juanma Rodriguez, Absolute Recorded: Sep 7 2017 61 mins
    Las estrategias tradicionales de protección de dispositivos están perdiendo la batalla. Los ataques son incesantes y cada vez más sofisticados. Esto ha aumentado la exigencia de los profesionales de seguridad y obliga a las empresas a adoptar nuevos paradigmas que faciliten que los sistemas se auto-recuperen. Para frenar las fugas de datos, debemos ser más inteligentes al detectar y responder a las amenazas.

    Este oportuno webinar de Absolute explora cómo conseguir que sus sistemas se auto-recuperen y que estén preparados para enfrentarse a amenazas cambiantes.
  • Introducing Absolute Reach: Complete Endpoint Visibility and Control
    Introducing Absolute Reach: Complete Endpoint Visibility and Control Phil Shomura, Absolute Recorded: Aug 29 2017 37 mins
    When endpoints go rogue or become invisible, you need to act quickly to protect your organization and mitigate risk. But with limited visibility and a lack of dependable deployment methods, that hasn’t always been possible—until now.

    Absolute Reach™, a flexible endpoint security feature within the Absolute Platform that gives you the power to execute custom discovery, compliance, and remediation tasks across 100% of your endpoints on-demand, anytime or anywhere:

    • Assess and enhance security posture: Always-on visibility and control—on and off the network
    • Eliminate blind spots: Remediate known vulnerabilities on the spot
    • Gather precise insights from any endpoint: Evaluate risk and prove compliance
    • Remediate with lightning speed: Script once. Deploy everywhere
    • Validate delivery for compliance assurance: Receive confirmation of successful delivery and execution

    Find out how to ensure protection in the event of emerging threats, such as ransomware and other endpoint vulnerabilities. Register for the webinar now.
  • The Cost of Insecure Endpoints – New Findings from Ponemon Institute
    The Cost of Insecure Endpoints – New Findings from Ponemon Institute Dr. Larry Ponemon, Chairman and Founder, Ponemon Institute & Richard Henderson, Global Security Strategist, Absolute Recorded: Jul 27 2017 64 mins
    Just how dangerous, inefficient, and ineffective are the endpoint security solutions used in most organizations today? Ponemon Institute independently surveyed hundreds of IT security professionals to find out — and are ready to share the surprising results in this important webinar.

    On July 27th, join founder and chairman, Dr. Larry Ponemon, and Richard Henderson, global security strategist at Absolute, for an interactive webinar on the results, including:

    • Exposing the largest dangers and greatest inefficiencies with endpoint security management today
    • Average financial and productivity costs associated with insecure systems – and how to mitigate in your organization
    • Steps you can take now to prevent attacks and stay compliant
  • GDPR: Global Implications of EU Legislation
    GDPR: Global Implications of EU Legislation Jonathan Armstrong, Cordery & Nima Baiati, Absolute Recorded: May 23 2017 62 mins
    Enforcement of the EU General Data Protection Regulation (GDPR) is looming, giving you less than 12 months to prepare. And it has major implications for every organization that processes EU personal data – regardless of where they are based.

    With the cost of non-compliance set at an astronomical 4% of global annual revenue – not to mention damage to reputation – the time to protect yourself is now.

    On May 23rd, join Absolute’s data protection experts alongside leading technology and compliance lawyer Jonathan Armstrong, as they share practical insights on the global implications of GDPR. Register today and learn:

    • GDPR compliance – what’s required and what’s at stake
    • Organizational steps you need to take now to avert disaster
    • The best security approaches to ensure compliance and protect your data – and your brand
  • The New Threshold of Comprehensive Security – Why Self-Healing is Imperative
    The New Threshold of Comprehensive Security – Why Self-Healing is Imperative Kim Ellery, Director, Product Marketing, Absolute Recorded: Mar 23 2017 30 mins
    Traditional strategies for protecting endpoints are failing as attacks increase in relentlessness and sophistication. This reality has elevated the demands on security professionals and requires that organizations adopt new security paradigms that unlock the power of self-healing systems. To stop security breaches at the source, we must become faster at intelligently detecting and responding to threats. This timely webinar from Absolute explores how to realize self-healing systems in your own organization and ensure preparedness in the face of evolving threats.

Embed in website or blog