IGO Strengthens Endpoint Visibility and Cyber Resilience with Absolute Secure Endpoint

Securing distributed digital assets across remote mine sites with Absolute Secure Endpoint.

IGO is a leading mining and exploration enterprise operating across multiple locations throughout Australia. The company’s portfolio includes nickel, copper, and other essential resources supporting the global transition to renewable energy. With operations and teams working across remote mine sites, corporate offices, and hybrid environments, maintaining strong visibility, security, and resilience across its distributed digital assets is essential to the company’s ongoing success.

The Story

Securing a Distributed Hybrid Workforce

As IGO expanded operations and embraced hybrid work, the IT team faced significant challenges maintaining consistent endpoint visibility and security across a growing device fleet. Their complex environment includes Windows laptops, desktops, and rugged field devices moving constantly between remote mine sites, corporate offices, and employee homes. Maintaining the integrity of critical security tools, tracking offline devices, and managing manual troubleshooting created immense operational overhead.

Absolute Security’s platform is dependable, the insights are actionable, and the support has been responsive.

Michael von Bergheim, Team Lead IT Support, Corporate, IGO Limited
The Solutions

How They Did It

Reliable visibility and control across a distributed fleet

IGO implemented Absolute Secure Endpoint to gain persistent visibility and control across its distributed device fleet. A key differentiator for the team was Absolute’s firmware-embedded persistence technology, which allows the platform to remain active even if the operating system is tampered with or security agents are removed.

Building cyber resilience

For IGO, cyber resilience means having the ability to withstand, recover from, and operate through cyber incidents—not just preventing them. Absolute Security plays a critical role in achieving this resilience by delivering persistent asset intelligence, automated self-healing for critical applications, and rapid response capabilities. Even if a device becomes offline, tampered with, or relocated, the organization maintains visibility and ensures that its core security controls remain intact and operational.

Broader business operations support

Beyond endpoint security, IGO leverages Absolute insights to validate compliance with internal security policies and provide valuable data during audits. Mobility and field-support teams also use the tracking capabilities to better manage rugged devices that move between sites during operational rotations.

Deployment success

The IGO team reported a seamless experience with Absolute, highlighting the efficient, responsive support and smooth rollout. The deployment team ensured fast onboarding, minimized friction, and enabled IGO to quickly operationalize the solution across all sites.

Absolute Security’s platform is dependable, the insights are actionable, and the support has been responsive.

Michael von Bergheim, Team Lead IT Support, Corporate, IGO Limited

Our experience has been very positive. The deployment team ensured a smooth rollout, and we found the solution straightforward to operationalize.

Michael von Bergheim, Team Lead IT Support, Corporate, IGO Limited
The Results

Strengthened business resilience & improved efficiency

Following deployment, IGO achieved measurable outcomes across its distributed device fleet. Support tickets related to malfunctioning security software dropped significantly, endpoint compliance rates increased, and audit readiness improved due to enhanced device lifecycle visibility. The IT team now spends less time locating or verifying device status and can quickly identify and remediate vulnerable endpoints—directly reducing operational risk and allowing focus on priority initiatives.

For IGO, Absolute Secure Endpoint:

  • Reduced support tickets related to malfunctioning security applications.
  • Increased endpoint compliance rates across the device fleet.
  • Saved time spent locating or verifying device status.
  • Reduced risk exposure from missing patches or disabled security tools.
  • Improved visibility into device lifecycle management and audit readiness.

Read Other Customer Stories

Yorkshire Water

Yorkshire Water

Yorkshire Water improves productivity and service reliability with Absolute Secure Access, ensuring field teams stay connected.
Assala Energy

Assala Energy

Assala Energy uses Absolute Secure Endpoint to improve visibility and control over its entire device fleet, enabling more efficient IT operations and stronger security management.
BW Offshore

BW Offshore

With Absolute Secure Endpoint, BW Offshore gains complete visibility and control over its devices, protecting sensitive operational data and maintaining compliance standards.
Tullow Oil

Tullow Oil

Tullow Oil protects sensitive exploration data on hundreds of laptops worldwide using Absolute Secure Endpoint, ensuring operational security.