Top Healthcare Organization Chooses Absolute Self-Healing Endpoint Security Product to Secure more than 100,000 Endpoint Devices, Protect Patient Data and Ensure Compliance
Healthcare providers are under constant attack; demand endpoint security that ensures uncompromised visibility and control to safeguard patient healthcare and PII data
VANCOUVER, Canada: February 6, 2017 — Absolute, the self-healing endpoint security company, today announced an enterprise-wide deployment of its cloud-based endpoint security solution with one of the largest hospital systems in the United States. The sale, which closed in the Company’s fiscal second quarter, underscores the need for endpoint security in the healthcare industry, as well as Absolute’s unique ability to protect patient data and company information at the source.
Like most healthcare providers, this customer faced several challenges: mobile devices with business-critical applications containing financial and patient data; limited visibility into the health of those applications; and tracking and remediating lost or stolen devices.
“Healthcare is one of the most regulated industries with the strictest compliance standards. If a single laptop with patient data goes rogue, the financial penalties and reputational damage will cripple a business for years,” said Geoff Haydon, Chief Executive Officer, Absolute. “Protecting sensitive and patient data on networked and mobile medical devices requires always-on security that goes where your data goes. You need security that cannot be compromised by negligent users or sophisticated attackers.”
Endpoint Security in Healthcare
Absolute solutions give healthcare providers the uncompromised visibility and control to secure devices, applications and data to maintain the trust of patients and stakeholders, and stay in compliance. These tools are especially important to the healthcare industry because, according to Gartner, 80 percent of healthcare delivery organizations will have been the target of a cyberattack through a mobile device by 2020.1
Laptops, tablets and smartphones containing sensitive patient data now serve as networked medical devices and have become an important part of the healthcare IT landscape. These devices are often lost, or the endpoint agents needed to enable IT and security to see and control them are often broken or disabled. These dark endpoints provide an attractive threat vector for both insiders and attackers to access patient health data. It happens every day, many times a day. Legacy tools require devices to be connected to the corporate network and endpoint controls to be present and healthy in order to stay in compliance. Absolute’s self-healing endpoint security gives hospitals and other healthcare providers the ability to reduce the dwell time of a dark asset, reducing the likelihood that it will become a breach vector. Absolute’s technology addresses these challenges, giving healthcare organizations more visibility into their security profile – and the insights to make critical adjustments.
Absolute takes a new approach to cybersecurity with the first self-healing endpoint security solution that delivers uncompromised visibility and offers near real-time remediation of breaches at the source. Absolute’s cloud-based platform puts IT and security professionals in total command of devices, data and applications — whether on or off the network — to enhance IT asset management, protect sensitive data, reduce insider threats, and ensure compliance. Absolute's patented Persistence technology is embedded in the firmware of more than one billion PC and mobile devices from global manufacturers including Acer, ASUS, Dell, Fujitsu, HP, Lenovo, Microsoft, Panasonic, Samsung, and Toshiba. Absolute is headquartered in Vancouver, Canada, and has offices around the world. For more information, visit www.absolute.com.
©2017 Absolute Software Corporation. All rights reserved. Absolute and Persistence are registered trademarks of Absolute Software Corporation. For patent information, visit www.absolute.com/patents. The Toronto Stock Exchange has neither approved nor disapproved of the information contained in this news release.
For more information, please contact:
Media and Analyst Relations
Darah Patton, InkHouse
email@example.com or 1 317 695 5630
Joo-Hun Kim, MKR Group
firstname.lastname@example.org or 1 212 868 6760
1. Source: Gartner, Five Best Practices that Healthcare Provider CIOs Can Use to Reduce Mobile Device Security Risk (published April 21, 2016)