Absolute Enables Enterprises to Harden Mobile Endpoint Security with Persistent Awareness and Remediation of Android Devices and Endpoint Agents

Absolute expands its self-healing endpoint security and compliance solutions for Android devices to provide near real-time visibility into the security posture of mobile devices, data and applications — on and off the corporate network

VANCOUVER, Canada: June 08, 2017Absolute, the self-healing endpoint security company, today announced new endpoint security and compliance capabilities to help IT security leaders better manage and secure Android devices and data. Absolute expands its support for the Android operating system (OS) to provide uncompromised visibility and control over Android tablets and smartphones — both on and off the corporate network — to help enterprises assess vulnerabilities, prioritize risks and proactively remediate. For the first time, IT security professionals have a single cloud-based solution for unrivalled visibility into any type of endpoint across the enterprise, including Windows, Mac, Android and Chromebooks.

Environments with a mix of devices running different OS versions are the norm in today’s BYOD world, and the diverse Android ecosystem provides flexibility to use various device types across the enterprise. However, this flexibility can lead to risk. In fact, only 5 percent of Android devices in these environments are running the latest version of the Android OS1. Device flexibility also leads to OS fragmentation, making it more difficult to manage and secure these devices or assess a device in isolation to address vulnerabilities and reduce the risks of breaches.

“Attackers are becoming increasingly sophisticated, targeting the weakest points in layered defenses — the dark or invisible endpoint. The recent WannaCry ransomware attack highlighted the widespread vulnerabilities associated with unpatched rogue endpoints and OS version fragmentation,” said Bob Lyle, Vice President of Mobile, Absolute. “While WannaCry targeted Windows devices, Android devices represent a much larger target. Absolute has enhanced its coverage of Android phones and tablets to give IT security the near real-time insights and remediation they need to see and secure all endpoint devices.”

Absolute’s new Android capabilities are part of the company’s cloud-based Data and Device Security product that maintains its connection to Absolute Persistence® technology embedded in the firmware of more than 1 billion popular endpoint devices. With Persistence, even if a device is in the hands of a criminal or a malicious insider, IT security will retain control and trigger nearly instant remediation whenever an incident occurs. Now, security professionals can:

  • Take a holistic approach to endpoint security by assessing Android endpoints alongside Windows, Mac and Chromebook devices from a single pane of glass
  • Get virtually instant insight into their entire endpoint population and security posture to protect hardware, software and information assets, assess vulnerability and prove compliance
  • Generate specific reports to prove to auditors that security measures were properly implemented and in place at the time of an incident
  • Track Android devices on a Google Map™, including recent and historical locations
  • Create geofences based on corporate policies and investigate or freeze devices that are out of bounds or entering an unauthorized location
  • Pre-empt security incidents with virtually instant notifications if risk conditions are triggered and receive vulnerability scoring for deeper intelligence and alert prioritization

Availability

Absolute’s Android Vulnerability Report is available immediately as part of the Absolute Data and Device Security Professional and Premium editions. For more information on assessing and improving endpoint security and compliance, go to www.absolute.com/android.

About Absolute

Absolute takes a new approach to cybersecurity with the first self-healing endpoint security solution that delivers uncompromised visibility and offers near real-time remediation of breaches at the source. Absolute’s cloud-based platform puts IT and security professionals in total command of devices, data and applications — whether on or off the network — to enhance IT asset management, protect sensitive data, reduce insider threats, and ensure compliance. Absolute's patented Persistence technology is embedded in the firmware of more than one billion PC and mobile devices from global manufacturers including Acer, ASUS, Dell, Fujitsu, HP, Lenovo, Microsoft, Panasonic, Samsung, and Toshiba. Absolute is headquartered in Vancouver, Canada, and has offices around the world. For more information, visit www.absolute.com.

©2017 Absolute Software Corporation. All rights reserved. Absolute and Persistence are registered trademarks of Absolute Software Corporation. For patent information, visit www.absolute.com/patents. The Toronto Stock Exchange has neither approved nor disapproved of the information contained in this news release.

For more information, please contact:

Media and Analyst Relations
Darah Patton, InkHouse
absolute@inkhouse.com or 1 317 695 5630

Investor Relations
Joo-Hun Kim, MKR Group
joohunkim@mkrir.com or 1 212 868 6760

Citation

1. Source: Android Developer Preview (May 2, 2017)