Absolute Provides Targeted Meltdown and Spectre Risk Assessment Automation to Speed Vulnerability Remediation and Protect Data
Within 24 hours, Absolute delivered automated vulnerability detection, enabling real-time endpoint assessment, remediation, and protection in the face of Meltdown/Spectre
VANCOUVER, British Columbia — January 11, 2018—Absolute, the endpoint visibility and control company, today announced new additions to the Absolute Reach Library, including automated risk assessment tools to mitigate the business risk of new Meltdown and Spectre vulnerabilities. Absolute Reach provides organizations with the situational awareness to identify vulnerable endpoints — on- and off- the corporate network — and protect data, guiding customers through appropriate remediation and prevention steps.
Same day response to high priority endpoint vulnerabilities is increasingly critical as organizations work to reduce risks to sensitive data and brand reputation. As threats like Meltdown and Spectre emerge, Absolute’s rapid response team assesses the technical details of the event, developing targeted risk assessment and remediation tools that have been validated to help organizations reduce their exposure. These automated workflows are made available to customers via the Absolute Reach library, accelerating time to remediate and arming security staff with automated workflows to mitigate risks and protect data.
“IT security professionals must act quickly and with certainty to ensure data, devices and applications are secure as new cyber threats emerge,” said Dean Ćoza, Executive Vice President of Products. “The time-sensitive fight to contain vulnerabilities such as Spectre and Meltdown is often delayed due to a lack of technical expertise and instrumentation. With the power of Absolute Reach, customers can now expedite their adaptive endpoint protection with minimal effort by leveraging Absolute Reach. In addition, Absolute’s patentedPersistence technologyenables this technology to be deployed on all endpoints, including dark endpoints, filling a crucial security blind spot.”
As threats evolve, users can follow the prompt-driven Absolute Reach wizard to query and remediate endpoint vulnerabilities using authenticated workflows — all based on the collective intelligence of experienced security experts who have addressed the issue successfully. Following remediation, users can instantly validate that all endpoints are secure and compliant.
Absolute Reach provides the actionable and authenticated automation IT and security teams at all skill levels need to:
Significantly reduce endpoint query and remediation time requirements.
Intuitively apply remedial actions across an entire endpoint population with a few clicks.
Collect deeper insights for compliance — e.g., assess exposure to new vulnerabilities.
Leverage hundreds of other IT asset and security workflows — such as patch status, power configuration settings, application installation/removal and wireless configuration updates.
Avoid the need to modify workflows for their environment or limit the deployment to only on-network devices, a common challenge for administrators using other community scripting resources and tools.
To remain safe and resilient in the face of security vulnerabilities, customers can also extend Absolute’s self-healingApplication Persistenceto complementary endpoint controls such as CrowdStrike, Carbon Black, Cylance and other agents. Application Persistence prevents additional security posture gaps by monitoring current status and blocking attempts to exploit vulnerabilities.
Absolute empowers more than 12,000 customers worldwide to protect devices, data, applications, and users against theft or attack — both on and off the corporate network. With the industry’s only tamper-proof endpoint visibility and control solution, Absolute allows IT organizations to enforce asset management, security hygiene, and data compliance for today’s remote digital workforces. Absolute’s patented Persistence®technology is embedded in the firmware of Dell, HP, Lenovo, and 22 other leading manufacturers’ devices for vendor-agnostic coverage, tamper-proof resilience, and ease of deployment. See how it works atwww.absolute.comand follow us at@absolutecorp.