Top Healthcare Organization Chooses Absolute Self-Healing Endpoint Security Product to Secure more than 100,000 Endpoint Devices, Protect Patient Data and Ensure Compliance
Healthcare providers are under constant attack; demand endpoint security that ensures uncompromised visibility and control to safeguard patient healthcare and PII data
VANCOUVER, Canada: February 6, 2017 — Absolute, the self-healing endpoint security company, today announced an enterprise-wide deployment of its cloud-based endpoint security solution with one of the largest hospital systems in the United States. The sale, which closed in the Company’s fiscal second quarter, underscores the need for endpoint security in the healthcare industry, as well as Absolute’s unique ability to protect patient data and company information at the source.
Like most healthcare providers, this customer faced several challenges: mobile devices with business-critical applications containing financial and patient data; limited visibility into the health of those applications; and tracking and remediating lost or stolen devices.
“Healthcare is one of the most regulated industries with the strictest compliance standards. If a single laptop with patient data goes rogue, the financial penalties and reputational damage will cripple a business for years,” said Geoff Haydon, Chief Executive Officer, Absolute. “Protecting sensitive and patient data on networked and mobile medical devices requires always-on security that goes where your data goes. You need security that cannot be compromised by negligent users or sophisticated attackers.”
Endpoint Security in Healthcare
Absolute solutions give healthcare providers the uncompromised visibility and control to secure devices, applications and data to maintain the trust of patients and stakeholders, and stay in compliance. These tools are especially important to the healthcare industry because, according to Gartner, 80 percent of healthcare delivery organizations will have been the target of a cyberattack through a mobile device by 2020.1
Laptops, tablets and smartphones containing sensitive patient data now serve as networked medical devices and have become an important part of the healthcare IT landscape. These devices are often lost, or the endpoint agents needed to enable IT and security to see and control them are often broken or disabled. These dark endpoints provide an attractive threat vector for both insiders and attackers to access patient health data. It happens every day, many times a day. Legacy tools require devices to be connected to the corporate network and endpoint controls to be present and healthy in order to stay in compliance. Absolute’s self-healing endpoint security gives hospitals and other healthcare providers the ability to reduce the dwell time of a dark asset, reducing the likelihood that it will become a breach vector. Absolute’s technology addresses these challenges, giving healthcare organizations more visibility into their security profile – and the insights to make critical adjustments.
Absolute is the new standard for endpoint visibility and control, delivering always-connected IT asset management and self-healing endpoint security to protect devices, data, applications and users — on and off the network. Bridging the gap between IT operations and security, only Absolute gives enterprises visibility they can act on to assess every endpoint, remediate vulnerabilities and at-risk data, and ensure compliance in the face of insider and external threats. Absolute’s patented Persistence technology is already embedded in the firmware of more than one billion PC and mobile devices and trusted by over 20,000 customers worldwide.
©2017 Absolute Software Corporation. All rights reserved. Absolute and Persistence are registered trademarks of Absolute Software Corporation. For patent information, visit www.absolute.com/patents. The Toronto Stock Exchange has neither approved nor disapproved of the information contained in this news release.
For more information, please contact:
Media and Analyst Relations
Darah Patton, InkHouse
firstname.lastname@example.org or 1 317 695 5630
Joo-Hun Kim, MKR Group
email@example.com or 1 212 868 6760
1. Source: Gartner, Five Best Practices that Healthcare Provider CIOs Can Use to Reduce Mobile Device Security Risk (published April 21, 2016)