Skip to main content

Absolute Provides Targeted Meltdown and Spectre Risk Assessment Automation to Speed Vulnerability Remediation and Protect Data

Absolute, the endpoint visibility and control company, today announced new additions to the Absolute Reach Library, including automated risk assessment tools to mitigate the business risk of new Meltdown and Spectre vulnerabilities. Absolute Reach provides organizations with the situational awareness to identify vulnerable endpoints — on- and off- the corporate network — and protect data, guiding customers through appropriate remediation and prevention steps.

Same day response to high priority endpoint vulnerabilities is increasingly critical as organizations work to reduce risks to sensitive data and brand reputation. As threats like Meltdown and Spectre emerge, Absolute’s rapid response team assesses the technical details of the event, developing targeted risk assessment and remediation tools that have been validated to help organizations reduce their exposure. These automated workflows are made available to customers via the Absolute Reach library, accelerating time to remediate and arming security staff with automated workflows to mitigate risks and protect data.

“IT security professionals must act quickly and with certainty to ensure data, devices and applications are secure as new cyber threats emerge,” said Dean Ćoza, Executive Vice President of Products. “The time-sensitive fight to contain vulnerabilities such as Spectre and Meltdown is often delayed due to a lack of technical expertise and instrumentation. With the power of Absolute Reach, customers can now expedite their adaptive endpoint protection with minimal effort by leveraging Absolute Reach. In addition, Absolute’s patented Persistence technology enables this technology to be deployed on all endpoints, including dark endpoints, filling a crucial security blind spot.”

As threats evolve, users can follow the prompt-driven Absolute Reach wizard to query and remediate endpoint vulnerabilities using authenticated workflows — all based on the collective intelligence of experienced security experts who have addressed the issue successfully. Following remediation, users can instantly validate that all endpoints are secure and compliant. Watch this demo to see how Absolute Reach and the growing library of automated workflows helps users assess and remediate security vulnerabilities such as Spectre and Meltdown.

Absolute Reach provides the actionable and authenticated automation IT and security teams at all skill levels need to:

  • Significantly reduce endpoint query and remediation time requirements.
  • Intuitively apply remedial actions across an entire endpoint population with a few clicks.
  • Collect deeper insights for compliance — e.g., assess exposure to new vulnerabilities.
  • Leverage hundreds of other IT asset and security workflows — such as patch status, power configuration settings, application installation/removal and wireless configuration updates.
  • Avoid the need to modify workflows for their environment or limit the deployment to only on-network devices, a common challenge for administrators using other community scripting resources and tools.

To remain safe and resilient in the face of security vulnerabilities, customers can also extend Absolute’s self-healing Application Persistence to complementary endpoint controls such as CrowdStrike, Carbon Black, Cylance and other agents. Application Persistence prevents additional security posture gaps by monitoring current status and blocking attempts to exploit vulnerabilities.

To learn more about how the automated workflows available with Absolute Reach can help you assess and remediate security vulnerabilities, eliminate blind spots, and ensure compliance, visit www.absolute.com/reach.

About Absolute

Absolute set the new standard for endpoint visibility and control with self-healing endpoint security and always-connected IT asset management to protect devices, data, applications and users — on and off the network. Bridging the gap between security and IT operations, only Absolute gives enterprises visibility they can act on to protect every endpoint, remediate vulnerabilities and ensure compliance in the face of insider and external threats. Absolute’s patented Persistence technology is already embedded in the firmware of more than one billion PCs and mobile devices, and is trusted by over 15,000 customers worldwide. For the latest information, visit www.absolute.com and follow us at @absolutecorp.

©2018 Absolute Software Corporation. All rights reserved. Absolute and Persistence are registered trademarks of Absolute Software Corporation. For patent information, visit www.absolute.com/patents. The Toronto Stock Exchange has neither approved nor disapproved of the information contained in this news release.

Contacts:

Media and Analyst Relations
InkHouse
Darah Patton, 317-695-5630
absolute@inkhouse.com
or
Investor Relations
MKR Group
Joo-Hun Kim, 212-868-6760
joohunkim@mkrir.com

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.