L.A. Tourism Leverages Absolute Secure Endpoint to Improve Endpoint Management and Protection

The Los Angeles Tourism and Convention Board Meets Its Compliance and Endpoint Security Needs With Absolute Secure Endpoint

The Los Angeles Tourism and Convention Board (L.A. Tourism) is the official destination marketing and sales organization for the City of Los Angeles. They recently moved the entire organization to a 100 percent mobile device fleet model to better facilitate their global workforce—most of which operated remotely and constantly traveled with their devices.

The Story

Keep Endpoints Protected and Compliant

As a non-profit organization, L.A. Tourism must be efficient with its resources—both devices and people—many of which are located in satellite offices worldwide. The IT team is responsible for managing and protecting the organization’s endpoints. All the while ensuring L.A. Tourism complies with the General Data Protection Regulation (GDPR) and various other global data security and privacy regulations.

L.A. Tourism decided on Absolute Secure Endpoint to help with four key areas: full visibility, global asset intelligence, regulatory compliance, and lease management.

Security Challenges

100% Asset

Resource Efficiency


"We had been searching for a solution like Absolute Secure Endpoint for many years. Now that we have implemented it across the organization, we’ve saved a tremendous amount of time tracking down devices while protecting the sensitive data on them. I would absolutely recommend Absolute."


The Solutions

How They Did It

Improved Visibility Keeps Devices Compliant

L.A. Tourism recognized the ability of Absolute Secure Endpoint to help maintain or meet regulatory requirements, such as GDPR, with its global workforce. By taking advantage of Absolute Secure Endpoint, L.A. Tourism could have an always-on connection to their entire device population at all times.

This level of visibility allows their IT team to know where their endpoints are located, understand when users drop off the network or the domain, or inadvertently change the device configuration. In addition, Absolute Secure Endpoint provides an enhanced level of control that enables them to fix device issues remotely. For a small IT team, this is a huge advantage.

Strengthen Security Posture With Improved Asset Management

With Absolute Secure Endpoint, L.A. Tourism’s IT team has a strong handle on managing their laptop leases and leads with a clear view of their global endpoint population. Knowing which devices have been returned and if the data has been deleted, while also being able to provide patches or freeze/wipe commands as needed, has helped them strengthen their security posture and increase the team’s efficiency.

Protect At-Risk Devices and Data

The transparency and connection to the devices they use allow L.A. Tourism to better understand where their sensitive data is stored and prove compliance with data security standards and regulations. In addition, whenever a laptop is misplaced or stolen, or an employee or a contractor leaves the organization, L.A. Tourism’s IT team is now able to freeze the device or wipe it clean remotely to protect any sensitive data that it may contain.

The Results

Improve Endpoint Security While Maintaining Compliance

With the capabilities of Absolute Secure Endpoint, L.A. Tourism has been able to protect its devices and maintain compliance.

For the L.A. Tourism team, Absolute Secure Endpoint:

  • Ensures an always-on connection to their entire device population at all times
  • Provides an enhanced level of control that enables the IT team to fix device issues remotely
  • Helps meet the demands of compliance regulations such as GDPR
  • Gives L.A. Tourism’s IT team a strong handle on managing their laptop leases and leads with a clear view of their global endpoint population

Absolute Platform FAQ

The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.

The Absolute Platform consists of three core components:

  • Absolute Persistence Technology

Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.

No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.

  • Absolute Resilience Technology

The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:

  • Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
  • Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
  • Absolute Intelligence

Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.

Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.

Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:

  • Web console
  • Mobile app
  • Rules and policy engine
  • Alerts
  • Dashboards
  • APIs
  • Application Persistence-as-a-Service SDK
  • Third-party integrations (e.g., SIEM, ITSM)

Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.

Like what you're hearing?

We’d love to show you how Absolute can secure and empower your organization.

Financial Services