Enterprise Security, Platform Security, Software Security

Absolute Software Adds Secure Web Gateway Service to its Differentiated Security Service Edge Solution

Absolute Software Adds Secure Web Gateway Service

Absolute Software (NASDAQ: ABST) (TSX: ABST), the only provider of self-healing, intelligent security solutions, today announced the expansion of its differentiated Security Service Edge (SSE) solution with the launch of the Absolute Secure Web Gateway Service. Optimized for hybrid and mobile work models, this new extended offering builds on existing capabilities available in Absolute Secure Access – including Absolute ZTNA and Absolute Insights™ for Network – and empowers organizations to strengthen security, boost productivity, and ensure compliance with internal IT and security policies.

With the shift to the work-from-anywhere model, web browsing has become a primary access point for the average employee to perform day-to-day responsibilities - from checking email to sharing files to collaborating. It is estimated that 75 percent of enterprise work happens via the browser. This large-scale adoption has also left enterprise security teams scrambling to strengthen their defenses against malicious actors exploiting the browser as a top attack vector. A recent report revealed that more than 90 percent of organizations surveyed have experienced a web or mobile attack.

The Absolute Secure Web Gateway Service, powered by Ericom, provides cloud-delivered security and protections, including multiple anti-virus scans; remote browser isolation; content disarm and reconstruction; and data loss prevention. It inspects web content in a cloud container before delivering it to the user’s web browser, enabling users to access links and download files without disruption – and without exposing their organization to increased risk.

“The work-from-anywhere model is here to stay. Even organizations encouraging employees to spend at least some time inside their respective facilities have accepted this new reality. The related burden falling on security and risk professionals is immense, as they are faced with finding ways to mitigate risk without disrupting normal business operations,” said Fernando Montenegro, Senior Principal Analyst, Cybersecurity, Omdia. “Enterprises that intend to thrive in the modern era and into the future will be forced to adopt solutions that enable them to quickly and easily expand access to networks and the Internet without interfering with their employees’ ability to do their jobs.”

“What sets Absolute Secure Access apart is that it is purpose-built technology designed to meet the complex needs of highly mobile, distributed workforces,” said Richard Hicks, founder and principal consultant at Richard M. Hicks Consulting, Inc. “With this extended offering, Absolute continues to deliver the innovative capabilities needed to ensure remote worker productivity and provide an exceptional experience for both users and IT administrators. The Secure Web Gateway integration is an excellent enhancement to existing reputation services, providing additional layers of security to further protect mobile users from malicious activity.”

“One inadvertent click can open the door for malicious actors to exploit an employee’s device and gain the access needed to move laterally across the corporate network,” said Joe Savarese, EVP of Secure Access Products at Absolute Software. “Designed from the ground up with a focus on remote and mobile users, our comprehensive Secure Access capabilities allow IT teams to adopt a ZTNA security approach while actively improving the experience for both end users and IT.”

The Absolute Secure Web Gateway Service is integrated with the extensive policy capabilities already available in Absolute Secure Access, enabling IT and security practitioners to tailor security levels for individuals and groups based on risk level, workflows, location, network, and other key parameters. Additionally, by feeding data to Absolute Insights for Network, IT and security teams have access to real-time intelligence to quickly assess security posture and identify where to take action to mitigate threats.

Other key business and security benefits of this extended offering include:

  • Optimized end user experience: The ability to automatically restore unhealthy network connections and applications, coupled with increased visibility into network health and security posture, actively improves the end user experience – boosting worker productivity and efficiency.
  • Stronger security and compliance posture: Organizations can now better meet compliance policies and regulations across their device estate and reduce risk of sensitive data loss or leakage associated with intentional or inadvertent file uploads by users.
  • Advanced malware protection: Evaluates webpages, files, software, and application data to find and eliminate malware threats, and blocks malware (including zero-day threats) from reaching endpoints and networks.

The Absolute Secure Web Gateway Service is available to Absolute Secure Access customers as an add-on to the Absolute Edge package in the Spring 2023 release. To learn more about this new extended offering, visit here. To learn more about Absolute Secure Access, the portfolio of solutions leveraging the company’s leading optimized secure tunnel, visit here.

About Absolute Software

Absolute Software (NASDAQ: ABST) (TSX: ABST) is the only provider of self-healing, intelligent security solutions. Embedded in more than 600 million devices, Absolute is the only platform offering a permanent digital connection that intelligently and dynamically applies visibility, control and self-healing capabilities to endpoints, applications, and network connections - helping customers to strengthen cyber resilience against the escalating threat of ransomware and malicious attacks. Trusted by nearly 21,000 customers, G2 recognized Absolute as a Leader for the thirteenth consecutive quarter in the Spring 2023 Grid® Report for Endpoint Management and for the third consecutive quarter in the Grid Report for Zero Trust Networking.

Spotlight

Other News
Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More