Healthcare providers are under constant attack; demand endpoint security that ensures uncompromised visibility and control to safeguard patient healthcare and PII data
VANCOUVER, Canada: February 6, 2017 — Absolute, the self-healing endpoint security company, today announced an enterprise-wide deployment of its cloud-based endpoint security solution with one of the largest hospital systems in the United States. The sale, which closed in the Company’s fiscal second quarter, underscores the need for endpoint security in the healthcare industry, as well as Absolute’s unique ability to protect patient data and company information at the source.
Like most healthcare providers, this customer faced several challenges: mobile devices with business-critical applications containing financial and patient data; limited visibility into the health of those applications; and tracking and remediating lost or stolen devices.
“Healthcare is one of the most regulated industries with the strictest compliance standards. If a single laptop with patient data goes rogue, the financial penalties and reputational damage will cripple a business for years,” said Geoff Haydon, Chief Executive Officer, Absolute. “Protecting sensitive and patient data on networked and mobile medical devices requires always-on security that goes where your data goes. You need security that cannot be compromised by negligent users or sophisticated attackers.”
Endpoint Security in Healthcare
Absolute solutions give healthcare providers the uncompromised visibility and control to secure devices, applications and data to maintain the trust of patients and stakeholders, and stay in compliance. These tools are especially important to the healthcare industry because, according to Gartner, 80 percent of healthcare delivery organizations will have been the target of a cyberattack through a mobile device by 2020.1
Laptops, tablets and smartphones containing sensitive patient data now serve as networked medical devices and have become an important part of the healthcare IT landscape. These devices are often lost, or the endpoint agents needed to enable IT and security to see and control them are often broken or disabled. These dark endpoints provide an attractive threat vector for both insiders and attackers to access patient health data. It happens every day, many times a day. Legacy tools require devices to be connected to the corporate network and endpoint controls to be present and healthy in order to stay in compliance. Absolute’s self-healing endpoint security gives hospitals and other healthcare providers the ability to reduce the dwell time of a dark asset, reducing the likelihood that it will become a breach vector. Absolute’s technology addresses these challenges, giving healthcare organizations more visibility into their security profile – and the insights to make critical adjustments.
About Absolute
Absolute empowers more than 12,000 customers worldwide to protect devices, data, applications, and users against theft or attack — both on and off the corporate network. With the industry’s only tamper-proof endpoint visibility and control solution, Absolute allows IT organizations to enforce asset management, security hygiene, and data compliance for today’s remote digital workforces. Absolute’s patented Persistence® technology is embedded in the firmware of Dell, HP, Lenovo, and 22 other leading manufacturers’ devices for vendor-agnostic coverage, tamper-proof resilience, and ease of deployment. See how it works at www.absolute.com and follow us at @absolutecorp.
©2019 Absolute Software Corporation. All rights reserved. ABSOLUTE and PERSISTENCE are registered trademarks of Absolute Software Corporation. Other names or logos mentioned herein may be the trademarks of their respective owners. For patent information, visit www.absolute.com/patents. The Toronto Stock Exchange has neither approved nor disapproved of the information contained in this press release.
For more information, please contact:
Media and Analyst Relations
Jill Rosenthal, InkHouse
[email protected] or 781-966-4167
Investor Relations
Joo-Hun Kim, MKR Group
[email protected] or 212-868-6760
CITATION
1. Source: Gartner, Five Best Practices that Healthcare Provider CIOs Can Use to Reduce Mobile Device Security Risk (published April 21, 2016)