Suffolk Construction Tracks, Manages, and Secures Devices With Absolute Secure Endpoint

Suffolk Construction Builds a More Secure Environment and Enhanced Asset Management Capability With Absolute Secure Endpoint

Since its foundation in 1982, Suffolk Construction has become one of the most successful, privately-held building contractors in the U.S. The company’s success is the result of passionate and highly-skilled employees, consistently superior performance, and exemplary customer service. Suffolk has over 600 laptops used remotely across hundreds of construction sites.

The Story

Manage a Field-Based Device Fleet

To best manage its multiple work sites, Suffolk provides employees with laptops. As these laptops are largely used remotely, the company required a high-tech tool to accurately inventory and manage an off-network, field-based fleet. In addition, Suffolk sought a reliable theft recovery solution, as notebook theft proved a costly occurrence.

Security Challenges

Minimizes
Costs

Easily
Locates Devices

Increases
IT Efficiencies

"With Absolute Secure Endpoint, I can identify and locate our entire computer fleet in a matter of minutes, without leaving the office… [Absolute] has really helped us to get a handle on our inventory, and definitely saves a lot of time."

ROBERT UMENHOFER
TEAM LEAD, DESKTOP SUPPORT
SUFFOLK CONSTRUCTION

The Solutions

How They Did It

Prevent Theft and Secure Devices Off the Corporate Network

Physically tracking, managing, and securing devices that are off the network is a difficult task. Combine this with a dispersed workforce and across construction sites that are a high target for theft. To address these challenges and maximize their device investment, Suffolk Construction turned to Absolute Secure Endpoint.

Streamline Inventory Processes While Minimizing Costs

Absolute Secure Endpoint has helped streamline the company’s inventory process and minimize the high costs of device theft. Robert Umenhofer, Suffolk’s Desktop Support Team Lead, states that Absolute is a “tremendous aid” when keeping tabs on remote devices and estimates that the product provides “a nearly 100% accurate picture of where our computers are located and who is using them.”

The Results

Enhanced Asset Management Capabilities Helps Improve IT Efficiencies

Umenhofer explains that IT efficiency has increased as a result, and there is no longer the need to visit individual job sites to track down a given machine. According to Umenhofer, an investment in Absolute Secure Endpoint is a “no-brainer.”

For Suffolk Construction, Absolute Secure Endpoint:

  • Streamlines Suffolk’s inventory process
  • Helps easily locate devices and determine who is using them
  • Minimizes the cost of device theft

Absolute Platform FAQ

The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.

The Absolute Platform consists of three core components:

  • Absolute Persistence Technology

Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.

No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.

  • Absolute Resilience Technology

The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:

  • Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
  • Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
  • Absolute Intelligence

Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.

Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.

Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:

  • Web console
  • Mobile app
  • Rules and policy engine
  • Alerts
  • Dashboards
  • APIs
  • Application Persistence-as-a-Service SDK
  • Third-party integrations (e.g., SIEM, ITSM)

Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.

Like what you're hearing?

We’d love to show you how Absolute can secure and empower your organization.

Financial Services