KCOM

KCOM Mitigates Security Risk and Adheres to GDPR

Endpoints hide, data stays out of sight, and users disable encryption or store sensitive data in the cloud. On your journey toward compliance, you will discover that it is impossible to secure what you cannot see. Only Absolute lets you continuously measure and improve against security best practices such as NIST CSF, HIPAA or CIS.

Customer Case Study

Benchmark Your Security Posture With Cybersecurity Frameworks

Industry

  • Professional Services

Country

  • United Kingdom

Platforms

  • Windows
Download

Challenges

The proportionately lean IT team at KCOM struggled to keep up with the demands of a rapidly-growing, geographically dispersed company that was often working off the corporate network. They needed a solution to help them:

  • Manage and secure a largely remote workforce in both a meaningful and time-efficient way
  • Protect the Personally Identifiable Information (PII) of KCOM and their clients
  • Maintain compliance with GDPR and other data privacy regulations

Solution

KCOM saw the immediate benefits of Absolute’s Application Persistence. The self-healing technology could make their VPN agent resilient on all their endpoints and help them remain in a position to remotely manage any endpoint and fix it if it has an issue.

When it comes to responding to incidents, KCOM has a security event triggered automatically every time an endpoint is stolen, lost or misplaced. “If we can’t see it, there’s a risk to it,” said Steve Williams, Manager, IT Operations. “The first step is remotely locking a device by using Absolute so nobody can get access to it.”

The team is now also confident that KCOM’s data is secure at all times. “The safety of our information is very important, especially from a GDPR perspective. With Absolute, we can confidently say that no sensitive information is compromised or accessed, and all records and data on any PC are completely safe, no matter what,” he explained.

Results

1
STRENGTHENED SECURITY POSTURE

Automatic self-healing of failing endpoint security applications, on or off the network.

2
INCREASED OPERATIONAL EFFICIENCY

Ability to see, control and secure all endpoints remotely, no matter what happens.

3
PEACE OF MIND AND PROOF OF COMPLIANCE

Total confidence that any sensitive data is safe at all times and the ability to prove GDPR compliance.

From a GDPR perspective, we can confidently say that no sensitive information is compromised or accessed, and all records and data on any PC are completely safe, no matter what.

Steve Williams
Manager, IT Operations
KCOM