Air Corsica Pilots the Extension of its Information System with Absolute Secure Access

Absolute Secure Access Provides Resilient Remote Access to the Airline’s Mobile Users and Outsourced Applications

Air Corsica is a French airline based at Ajaccio Campo dell’Oro Airport on the island of Corsica in the Mediterranean. The local airline, which has more than 700 employees, serves up to 16 different airports with 30 annual or seasonal routes, carrying approximately two million passengers annually.

The Story

A Weakened Perimeter Security System

The expansion of the attack surface is a common phenomenon in most companies. Use of the cloud, remote working, and increasingly large networks have made perimeter security strategies obsolete. In an industry under intense regulatory pressure such as aerospace, this transformation requires new approaches in terms of cybersecurity. “We have been working on back-up, recovery, and business continuity practices for a long time and they are now integrated,” explains Albéric De Pertat, Network Manager at Air Corsica. “The challenge now is to control user accounts, specifically in the cloud. In the last few years, we have moved from a very on-premises structure, with an internal data centre and directory, to a global cloud, open and accessible from anywhere. This meant that we had to review all access policies and extend cybersecurity and monitoring to mobile users and the network edge.”

The French Civil Aviation Authority, Direction Générale de l’Aviation Civile (DGAC), and the French Military Planning Act require companies to comply with strict cybersecurity standards, particularly regarding remote access management. “The DGAC’s requirements aim to protect the company, but also the entire aviation ecosystem. As an airline, we have a very operational profession for the management of our flights. But we also have an IT connection to the state’s infrastructure and hackers could try to attack our systems to gain access to more sensitive information systems and affect airports, for instance,” explains De Pertat

Security Challenges

Ensures
Compliance

Saves IT
Hours

Prepares for
Zero Trust

"With Absolute Secure Access, we can guarantee that our secure tunnel is active at all times and for all users. This allows us to be compliant, but also to offer a better working environment to employees, because without this security guarantee, it would be difficult to be so open to remote working."

ALBÉRIC DE PERTAT
NETWORK MANAGER
AIR CORSICA

The Solutions

How They Did It

Securing Reliable Connectivity in Mobile and Cloud Environments

To secure these new mobile and cloud environments, Air Corsica has implemented Absolute Secure Access technology. Unlike a traditional VPN, which requires users to connect manually and sometimes impairs application performance, the solution is both resilient and transparent – no user interaction is required. The computer stays connected to the optimized secure tunnel and keeps the connection active, even in the event of a network failure. With a resilient Windows agent option available, it ensures that Absolute Secure Access automatically repairs or reinstalls itself if it is changed, deleted, or stops working. In addition, Absolute Secure Access will improve audio and video performance, thanks to a patented stream compression technology, while prioritizing connections defined as critical by the administrators. Air Corsica will benefit from continuous security while guaranteeing a quality experience for its employees.

Seamless Implementation Leads to New Initiatives

When it comes to the administration of the solution, Absolute Secure Access also met the expectations of a small IT team. The ease and efficiency it delivered, opened the door to new scenarios. Air Corsica is now considering implementing a fleet of tablets for its technicians. Each operation carried out on an aircraft must be recorded in maintenance software, access to which requires a Wi-Fi connection, which is only accessible from the hangar. “With 5G-connected Android tablets equipped with Absolute Secure Access, technicians can access the software, as well as all technical documentation, directly from the runways, which will save them precious time,” says De Pertat.

Paving the Way Towards a Zero Trust Environment

The company is also thinking about the future and possible migration to a Zero Trust approach. Absolute Secure Access offers not just a secure tunnel solution, but also Zero Trust Network Access (ZTNA), which allows companies to make a simple and gradual transition from one world to the other. “Absolute ZTNA would give us the possibility of authenticating access via Microsoft Azure and no longer via certificates on the machines,” explains Albéric De Pertat. “This would allow us to open up external access to the company more easily. Even if we don’t have a defined use case yet, we know that we are moving towards increasingly interconnected systems and that we must therefore anticipate both the opening up and the protection of these extended ecosystems.”

"Absolute Secure Access is unified for the entire fleet. The agent technology works the same way for all devices, which saves us time in training, preparation, and maintenance. The implementation is also very fast. It took us just one day to install the server and then we simply deployed the agents to 300 computers through Microsoft SCCM."

ALBÉRIC DE PERTAT
NETWORK MANAGER
AIR CORSICA

The Results

Piloting a Modern Cybersecurity Approach in Aerospace

With Absolute Secure Access, airlines like Air Corsica can ensure they are complying with regulatory requirements while ensuring their mobile users are securely connected. Air Corsica now benefits from continuous security without compromising on user experience.

For Air Corsica, Absolute Secure Access:

  • Provides resilient, remote access to the airline’s field personnel
  • Unifies the entire device fleet, saving the IT team time in training, preparation, and maintenance
  • Ensures the airline is compliant with DGAC’s strict cybersecurity requirements
  • Paves the way for the airline’s possible migration to a Zero Trust approach

Absolute Platform FAQ

The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.

The Absolute Platform consists of three core components:

  • Absolute Persistence Technology

Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.

No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.

  • Absolute Resilience Technology

The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:

  • Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
  • Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
  • Absolute Intelligence

Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.

Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.

Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:

  • Web console
  • Mobile app
  • Rules and policy engine
  • Alerts
  • Dashboards
  • APIs
  • Application Persistence-as-a-Service SDK
  • Third-party integrations (e.g., SIEM, ITSM)

Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.

Like what you're hearing?

We’d love to show you how Absolute can secure and empower your organization.

Financial Services