Absolute Provides Targeted Meltdown and Spectre Risk Assessment Automation to Speed Vulnerability Remediation and Protect Data

January 11, 2018

Within 24 hours, Absolute delivered automated vulnerability detection, enabling real-time endpoint assessment, remediation, and protection in the face of Meltdown/Spectre

VANCOUVER, British Columbia — January 11, 2018  Absolute, the endpoint visibility and control company, today announced new additions to the Absolute Reach Library, including automated risk assessment tools to mitigate the business risk of new Meltdown and Spectre vulnerabilities. Absolute Reach provides organizations with the situational awareness to identify vulnerable endpoints — on- and off- the corporate network — and protect data, guiding customers through appropriate remediation and prevention steps.

Same day response to high priority endpoint vulnerabilities is increasingly critical as organizations work to reduce risks to sensitive data and brand reputation. As threats like Meltdown and Spectre emerge, Absolute’s rapid response team assesses the technical details of the event, developing targeted risk assessment and remediation tools that have been validated to help organizations reduce their exposure. These automated workflows are made available to customers via the Absolute Reach library, accelerating time to remediate and arming security staff with automated workflows to mitigate risks and protect data.

“IT security professionals must act quickly and with certainty to ensure data, devices and applications are secure as new cyber threats emerge,” said Dean Ćoza, Executive Vice President of Products. “The time-sensitive fight to contain vulnerabilities such as Spectre and Meltdown is often delayed due to a lack of technical expertise and instrumentation. With the power of Absolute Reach, customers can now expedite their adaptive endpoint protection with minimal effort by leveraging Absolute Reach. In addition, Absolute’s patented Persistence technology enables this technology to be deployed on all endpoints, including dark endpoints, filling a crucial security blind spot.”

As threats evolve, users can follow the prompt-driven Absolute Reach wizard to query and remediate endpoint vulnerabilities using authenticated workflows — all based on the collective intelligence of experienced security experts who have addressed the issue successfully. Following remediation, users can instantly validate that all endpoints are secure and compliant.

Absolute Reach provides the actionable and authenticated automation IT and security teams at all skill levels need to:

  • Significantly reduce endpoint query and remediation time requirements.
  • Intuitively apply remedial actions across an entire endpoint population with a few clicks.
  • Collect deeper insights for compliance — e.g., assess exposure to new vulnerabilities.
  • Leverage hundreds of other IT asset and security workflows — such as patch status, power configuration settings, application installation/removal and wireless configuration updates.
  • Avoid the need to modify workflows for their environment or limit the deployment to only on-network devices, a common challenge for administrators using other community scripting resources and tools.

To remain safe and resilient in the face of security vulnerabilities, customers can also extend Absolute’s self-healing Application Persistence to complementary endpoint controls such as CrowdStrike, Carbon Black, Cylance and other agents. Application Persistence prevents additional security posture gaps by monitoring current status and blocking attempts to exploit vulnerabilities.

Share this article

About Absolute Software

Absolute Software makes security work. We empower mission-critical performance with advanced cyber resilience. Embedded in more than 600 million devices, our cyber resilience platform delivers endpoint-to-network access security coverage, ensures automated security compliance, and enables operational continuity. Nearly 21,000 global customers trust Absolute to protect enterprise assets, fortify security and business applications, and provide a frictionless, always-on user experience. To learn more, visit www.absolute.com and follow us on LinkedIn.

©2024 Absolute Software Corporation. All rights reserved. ABSOLUTE, the ABSOLUTE logo, and NETMOTION are registered trademarks of Absolute Software Corporation or its subsidiaries. Other names or logos mentioned herein may be the trademarks of Absolute or their respective owners. The absence of the symbols ™ and ® in proximity to each trademark, or at all, herein is not a disclaimer of ownership of the related trademark.

For more information, please contact:

Media Relations
Joe Franscella
[email protected]

Financial Services