COVID-19 brings the same IT and security challenges to enterprises and schools alike: device usage is up, sensitive data is more vulnerable, and devices remain fragile. Check back here weekly for updated data and additional insights on remote work and distance learning trends.
View By Industry
These insights leverage anonymized data from enterprise and education-specific subsets of nearly 8.5 million active, Absolute-enabled devices.
*Compliance definitions are specific to security application categories. Within the Absolute console, for the categories referenced above, compliance is defined as:
- Encryption: The process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Compliant encryption means that a fully-activated encryption volume was identified on the device.
- Anti-Virus (AV): Software designed to prevent malware or viruses from causing an infection on a computer. Compliant AV means that the definition has been updated within 45 days.
- Client Management: Software used for remote control, patch management, operating system deployment, network protection and other various services on a computer. Non-compliance factors typically include missing data, data pending, reboot pending or health check fail.
- Virtual Private Network (VPN): Extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Compliant VPN means that the version is current, and key components are installed and functioning.
**For the purposes of this dashboard, the following apps are considered “collaboration apps:” WebEx, Zoom, Skype, Microsoft Teams, Slack, Blue Jeans, Pidgin, Flock, GoToMeeting, Microsoft Lync, and Join.Me
1. IDC, 2016.
2. Ponemon, 2019.