Absolute Security Named a Sample Vendor for ASCA by Gartner

Absolute Security Named a Sample Vendor for ASCA by Gartner
Absolute Security Named a Sample Vendor in the Latest Gartner Hype Cycle
Businesses require robust security measures to prevent breaches, especially as attackers leverage AI for sophisticated phishing and endpoint attacks. With numerous cybersecurity innovations emerging, it’s crucial for security leaders to focus on comprehensive strategies to keep pace with evolving threats. Gartner Hype Cycle for Endpoint & Workspace Security assists security and risk management leaders in pinpointing technologies that strengthen endpoint and workspace defenses.
For the second year in a row, Absolute Security has been named a Sample Vendor for Automated Security Control Assessment (ASCA). Gartner defines ASCA as a technology that continuously analyzes, prioritizes and optimizes security controls to reduce an organization’s threat exposure. ASCA identifies configuration drift, policy and control deficiencies, detection logic gaps, poor defaults, and other misconfigurations in security controls. It then uses identified weaknesses to recommend and prioritize remediation steps to improve security against organization-specific threats.
Key findings from the report include:
- The complexity of managing security control configurations continues to grow with emerging threat vectors, the proliferation of security tools, and the high turnover of administration staff, leading to a more exposed attack surface
- Manual configuration reviews, occasional penetration tests or siloed, tool-centric administration of security controls are insufficient in the face of rapidly changing attack techniques
- Reduce complexity by pursuing security vendor consolidation or considering alternatives, such as “policy as code,” to manage security configurations
To learn more about why ASCA is important to reduce an organization’s attack surface, why we believe it must be considered an emerging cybersecurity component of today’s endpoint security best practices, and why Absolute Security is named a Sample Vendor, download the Gartner Hype Cycle for Endpoint and Workspace Security, 2024.
Gartner, Hype Cycle for Endpoint and Workspace Security, 2024, Franz Hinner, Chris Silva, 8 August 2024
GARTNER is a registered trademark and service mark of Gartner and Hype Cycle is a registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Absolute Security Named a Sample Vendor for ASCA by Gartner
ASCA Mentioned Again in Latest Gartner® Hype Cycle™ for Endpoint and Workspace Security
Absolute Security Named a Sample Vendor in the Latest Gartner Hype Cycle
Businesses require robust security measures to prevent breaches, especially as attackers leverage AI for sophisticated phishing and endpoint attacks. With numerous cybersecurity innovations emerging, it’s crucial for security leaders to focus on comprehensive strategies to keep pace with evolving threats. Gartner Hype Cycle for Endpoint & Workspace Security assists security and risk management leaders in pinpointing technologies that strengthen endpoint and workspace defenses.
For the second year in a row, Absolute Security has been named a Sample Vendor for Automated Security Control Assessment (ASCA). Gartner defines ASCA as a technology that continuously analyzes, prioritizes and optimizes security controls to reduce an organization’s threat exposure. ASCA identifies configuration drift, policy and control deficiencies, detection logic gaps, poor defaults, and other misconfigurations in security controls. It then uses identified weaknesses to recommend and prioritize remediation steps to improve security against organization-specific threats.
Key findings from the report include:
- The complexity of managing security control configurations continues to grow with emerging threat vectors, the proliferation of security tools, and the high turnover of administration staff, leading to a more exposed attack surface
- Manual configuration reviews, occasional penetration tests or siloed, tool-centric administration of security controls are insufficient in the face of rapidly changing attack techniques
- Reduce complexity by pursuing security vendor consolidation or considering alternatives, such as “policy as code,” to manage security configurations
To learn more about why ASCA is important to reduce an organization’s attack surface, why we believe it must be considered an emerging cybersecurity component of today’s endpoint security best practices, and why Absolute Security is named a Sample Vendor, download the Gartner Hype Cycle for Endpoint and Workspace Security, 2024.
Gartner, Hype Cycle for Endpoint and Workspace Security, 2024, Franz Hinner, Chris Silva, 8 August 2024
GARTNER is a registered trademark and service mark of Gartner and Hype Cycle is a registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Featured Resources
Learn more about Absolute Cyber Resilience
Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:
- Web console
- Mobile app
- Rules and policy engine
- Alerts
- Dashboards
- APIs
- Application Persistence-as-a-Service SDK
- Third-party integrations (e.g., SIEM, ITSM)