Absolute Secure Endpoint Protects Sensitive Oil and Gas Exploration Data on Hundreds of Laptops Used Worldwide

Tullow Oil Chooses Absolute Secure Endpoint to Keep Critical Data Safe in the Event of Devices Being Lost or Stolen

Tullow Oil is a leading independent oil and gas exploration and production company operating in 22 countries worldwide. The company has a strong presence in Africa, where it is opening up new basins and helping to establish new oil-producing countries such as Ghana and Uganda and a growing presence in Asia. Tullow Oil is headquartered in London and has a worldwide workforce of over 900. The company’s shares are listed on the London, Irish, and Ghana Stock Exchanges, and the business is a constituent of the FTSE 100 Index.

The Story

Safeguard Commercially Sensitive Data

One of the most critical assets for Tullow Oil is its information—especially geological information and data about new oil finds and areas of potential discovery. But, invariably, the location of existing and new oil reserves is often in some of the world’s most remote and inhospitable regions where there is a high risk of theft or crime. Tullow Oil staff, who travel extensively to these regions, need access to this data wherever they happen to be.

The company has a number of data protection measures in place, including data encryption. Still, it also wanted to put in place a means of securing and protecting devices, especially when they are used abroad. Since they started using Absolute Secure Endpoint, Tullow Oil has been able to protect important business data.

Security Challenges

Locks
Misplaced Devices

Enhanced
Geo-fencing Capabilities

Protects
Sensitive Data

"Absolute is now a key part of our data security measures because almost every time we’ve had a laptop stolen or mislaid, it allows us to prevent anyone from accessing the data. For a business like Tullow Oil, this capability is very important."

TRUDIE SEENEY
INFORMATION SYSTEMS ASSET MANAGER
TULLOW OIL

The Solutions

How They Did It

Manage and Wipe Stolen Devices, No Matter Where They Are

In one instance, a laptop was stolen from a car in Ghana. Almost immediately after the user reported the stolen laptop to headquarters in London, Seeney, and her team were able to use Absolute Secure Endpoint to delete the data from the computer. Via the cloud-based Absolute Console from her office in London, Seeney was able to launch the data delete capability, which instantly wiped the laptop’s hard drive in Ghana as soon as this device connected to the Web.

Protect Data on Mislaid Devices

Absolute Secure Endpoint has also proved to be equally valuable in less threatening situations. In situations when laptops have been mislaid, Absolute Secure Endpoint has been used to remotely lock the device rather than performing a data delete. This means that when the laptop is found again, it can be unlocked by an administrator. All the user’s data and settings are preserved, and they avoid the trouble and delay required to get the laptop image rebuilt.

The Results

Keeping Sensitive Data Safe on Hundreds of Devices Around the World

Tullow Oil is now looking at how Absolute can protect other mobile devices. “For Tullow Oil, saving money has not really been the main issue,” said Seeney. “It is the security of knowing that wherever our laptops might be in the world, we have a solution like Absolute Secure Endpoint to protect the data on them.”

For the Tullow Oil team, Absolute Secure Endpoint:

  • Ensures commercially sensitive data is protected anywhere in the world
  • Protects data on innocently mislaid laptops without wiping the device
  • Controls and limits the use of laptops to specific regions anywhere in the world

Absolute Platform FAQ

The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.

The Absolute Platform consists of three core components:

  • Absolute Persistence Technology

Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.

No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.

  • Absolute Resilience Technology

The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:

  • Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
  • Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
  • Absolute Intelligence

Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.

Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.

Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:

  • Web console
  • Mobile app
  • Rules and policy engine
  • Alerts
  • Dashboards
  • APIs
  • Application Persistence-as-a-Service SDK
  • Third-party integrations (e.g., SIEM, ITSM)

Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.

Like what you're hearing?

We’d love to show you how Absolute can secure and empower your organization.

Financial Services