Top Healthcare Organization Chooses Absolute Self-Healing Endpoint Security Product to Secure more than 100,000 Endpoint Devices, Protect Patient Data and Ensure Compliance

February 06, 2017

Healthcare providers are under constant attack; demand endpoint security that ensures uncompromised visibility and control to safeguard patient healthcare and PII data

VANCOUVER, Canada: February 6, 2017  Absolute, the self-healing endpoint security company, today announced an enterprise-wide deployment of its cloud-based endpoint security solution with one of the largest hospital systems in the United States. The sale, which closed in the Company’s fiscal second quarter, underscores the need for endpoint security in the healthcare industry, as well as Absolute’s unique ability to protect patient data and company information at the source.

Like most healthcare providers, this customer faced several challenges: mobile devices with business-critical applications containing financial and patient data; limited visibility into the health of those applications; and tracking and remediating lost or stolen devices.

“Healthcare is one of the most regulated industries with the strictest compliance standards. If a single laptop with patient data goes rogue, the financial penalties and reputational damage will cripple a business for years,” said Geoff Haydon, Chief Executive Officer, Absolute. “Protecting sensitive and patient data on networked and mobile medical devices requires always-on security that goes where your data goes. You need security that cannot be compromised by negligent users or sophisticated attackers.”

Endpoint Security in Healthcare

Absolute solutions give healthcare providers the uncompromised visibility and control to secure devices, applications and data to maintain the trust of patients and stakeholders, and stay in compliance. These tools are especially important to the healthcare industry because, according to Gartner, 80 percent of healthcare delivery organizations will have been the target of a cyberattack through a mobile device by 2020.1

Laptops, tablets and smartphones containing sensitive patient data now serve as networked medical devices and have become an important part of the healthcare IT landscape. These devices are often lost, or the endpoint agents needed to enable IT and security to see and control them are often broken or disabled. These dark endpoints provide an attractive threat vector for both insiders and attackers to access patient health data. It happens every day, many times a day. Legacy tools require devices to be connected to the corporate network and endpoint controls to be present and healthy in order to stay in compliance. Absolute’s self-healing endpoint security gives hospitals and other healthcare providers the ability to reduce the dwell time of a dark asset, reducing the likelihood that it will become a breach vector. Absolute’s technology addresses these challenges, giving healthcare organizations more visibility into their security profile – and the insights to make critical adjustments.

Share this article

About Absolute Software

Absolute Software (NASDAQ: ABST) (TSX: ABST) is the only provider of self-healing, intelligent security solutions. Embedded in more than 600 million devices, Absolute is the only platform offering a permanent digital connection that intelligently and dynamically applies visibility, control and self-healing capabilities to endpoints, applications, and network connections - helping customers to strengthen cyber resilience against the escalating threat of ransomware and malicious attacks. Trusted by more than 18,000 customers, G2 recognized Absolute as a leader for the tenth consecutive quarter in the Summer 2022 Grid® Report for Endpoint Management and as a high performer in the G2 Grid Report for Zero Trust Networking.

©2022 Absolute Software Corporation. All rights reserved. ABSOLUTE, the ABSOLUTE logo, and NETMOTION are registered trademarks of Absolute Software Corporation or its subsidiaries. Other names or logos mentioned herein may be the trademarks of Absolute or their respective owners. The absence of the symbols ™ and ® in proximity to each trademark, or at all, herein is not a disclaimer of ownership of the related trademark.

For more information, please contact:

Media Relations
[email protected] or 858-524-9443

Investor Relations
[email protected] or 212-868-6760

CITATION

1. Source: Gartner, Five Best Practices that Healthcare Provider CIOs Can Use to Reduce Mobile Device Security Risk (published April 21, 2016)

Financial Services