Absolute Software Corporation

08/06/2024 | Press release | Distributed by Public on 08/06/2024 08:07

Absolute Security Showcases Next Generation Cyber Resilience at Black Hat USA 2024

New Remote Rehydration Capability Automates Recovery and Remediation for Ransomware, BSOD, and other Disruptions

SEATTLE & LAS VEGAS -Absolute Securityv will demonstrate the next generation of Cyber Resilience at Black Hat USA 2024 in Las Vegas. During the conference, CISOs and other security and risk professionals responsible for protecting their organizations against threats and disruption are invited to hosted demonstrations of the Absolute Cyber Resilience Platform in the Business Expo Hall, booth #4312.

Entrenched remote and hybrid work models make it increasingly difficult for organizations to maintain visibility and control over PCs. AI and other innovations are requiring enterprises to accelerate new deployments and upgrades of millions of devices. Technical complexity and intensifying threats are disrupting business and causing security controls to fail at alarming rates. These and other factors are driving security and compliance risk to an all-time high.

The Absolute Cyber Resilience Platform is purpose-built to meet these challenges. Unique, firmware-based remote capabilities provide essential security, compliance, and business continuity benefits that modern enterprises need to thrive in today's digital world. Visit the Absolute Security booth to learn more about key capabilities and benefits provided by the Absolute Cyber Resilience Platform, including:

  • Remote Endpoint Rehydration: Customers disrupted by Blue Screen of Death (BSOD) incidents, malware attacks, including ransomware, unauthorized access, other threats, and technical errors can detect and remove corrupted files and threats from devices, restore them to an operational state, and rehydrate the operating system and all security and productivity applications via a fully remote, one-click process.
  • Visibility and Control: Customers maintain constant visibility and control over PC fleets and receive comprehensive intelligence on device security posture to establish a Comply-to-Connect, Zero Trust model. This ensures that only endpoints compliant with security policies can connect to corporate networks, assets, and data.

  • Cyber Resilience: Customers ensure that endpoint security controls maintain efficacy and compliance with security policies. This not only reduces the risk of threat detection and prevention failures, but also stops unauthorized access attempts while maintaining resilient network connectivity.

"Accelerating threats, remote and hybrid work, complexity, and technical errors are causing crippling BSOD events and other costly disruptions," said John Herrema, Chief Product Officer, Absolute Security. "Absolute's unique cyber resilience capabilities are already embedded in more than half a billion leading PCs. Customers that have activated us are operating their businesses with the assurance that they've reduced the risk of being paralyzed by a costly outage or falling victim to a cyber attack."