Absolute Secure Access Helps Establish Zero Trust Principles to Keep UNITY’s Distributed Workforce Securely Connected

UNITY Enhances the Security, Stability, and Reliability of Connections to Support its Business Needs

UNITY is a consulting firm renowned for supporting companies as they implement digital transformation plans. With 15 locations worldwide, the company’s ICT department is tasked with the smooth operation of global business activities while ensuring that regional project teams—regardless of location—can work together seamlessly.

The Story

Supporting a Distributed Workforce

Supporting a distributed workforce is critical to the success of a global consulting firm like UNITY. With 90 to 95 percent of the firm’s employees working from different locations, employees depend on having a reliable connection to the company’s IT services in order to access critical data. In response, the IT services team at UNITY is in the process of migrating from classic on-premises services to a modern hybrid cloud architecture.

Their legacy VPN solution was too rigidly geared towards a conventional network, plus the limited network coverage in several regions and buildings meant that some applications were difficult to use. For these reasons, UNITY decided to evaluate a more modern secure optimized tunnel solution that could better meet their requirements. After an intensive test phase, Absolute Secure Access was the clear choice.

Security Needs

Reliable
Connectivity

Secure
Remote Access

Track, Manage &
Report IT Assets

"Absolute Secure Access is characterized by a very high degree of product maturity in this market segment—and that is very important for quality-conscious, professional users. For us, Absolute Secure Access is currently the best solution on the market."

BJÖRN WOLF
HEAD OF ICT
UNITY

The Solutions

How They Did It

Making Connections Stable and Secure, Anywhere

Since the introduction of Absolute Secure Access on all laptop computers, UNITY has witnessed a number of key improvements. Now, when employees switch between UMTS and WLAN or UMTS to Edge networks from customer locations, their connections remain stable and secure regardless of where they are and the network they are using. Some mobile teams use data-intensive applications, such as material flow simulation, that generate almost 3TB of data volume each month, needing reliable remote access to run smoothly.

Enhancing the Reliability of Video Communications

In addition, there are now even more video conferences, which the company had already used frequently before the pandemic. With Absolute Secure Access, the security, stability, and reliability of the connections have been greatly enhanced, which paid off particularly well in 2020.

"We are using more and more applications from the cloud and will continue to rely on Absolute Secure Access in the future."

BJÖRN WOLF
HEAD OF ICT
UNITY

The Results

Providing a Modern Approach to Secure Remote Access

Absolute Secure Access provides a stable connection for UNITY‘s distributed workforce and allows IT to implement security using a modern Zero Trust approach. The three key advantages of Absolute Secure Access for UNITY are split tunneling, bandwidth optimization, and client management.

For UNITY, Absolute Secure Access:

  • Provides UNITY with a modern approach to remote access.
  • Guarantees a high transmission quality with the solution’s excellent bandwidth optimization, even in poorly connected environments.
  • Offers a unique tunnel solution to manage clients on mobile devices, including malware monitoring on endpoints.
  • Shortens the set-up time in order to start and maintain sessions, Web conferences, and other applications, even in difficult environments.
  • Allows UNITY to provide every employee with a very safe, reliable, and productive mobile workplace

Absolute Platform FAQ

The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.

The Absolute Platform consists of three core components:

  • Absolute Persistence Technology

Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.

No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.

  • Absolute Resilience Technology

The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:

  • Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
  • Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
  • Absolute Intelligence

Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.

Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.

Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:

  • Web console
  • Mobile app
  • Rules and policy engine
  • Alerts
  • Dashboards
  • APIs
  • Application Persistence-as-a-Service SDK
  • Third-party integrations (e.g., SIEM, ITSM)

Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.

Like what you're hearing?

We’d love to show you how Absolute can secure and empower your organization.

Financial Services