Persistent tracking of endpoint devices takes on insider threats
- By Derek Major
- Apr 28, 2016
As companies and government agencies work to protect themselves from outside attacks, research shows that most data breaches are consistently caused by staff, ex-employees or third-party partners. In fact, a 2015 study found that 74 percent of breaches originate from the extended enterprise.
Absolute, a security and data risk management solution provider, is attempting to tamp down on such insider threats with its Endpoint Data Discovery (EDD), which allows organizations to locate and protect specific sensitive data on endpoint devices even when they’re outside the enterprise network.
Through partnerships with computer manufacturers, Absolute’s Persistence module is built into the firmware of desktops, laptops, tablets and smartphones. Once the Persistence software agent is installed and activated, it provides a reliable two-way connection that allows IT managers to remotely track, manage and secure devices, investigate potential threats and take action in the event a security incident occurs.
Unlike traditional data scanning technologies, the combination of Persistence and EDD promises to give IT managers a consistent endpoint connection that locates devices and users beyond the organization’s network that are accessing sensitive information without authorization. In the event suspicious activity is detected, a customer can determine if data is at risk and secure the device and information remotely.
To help ensure clients’ regulatory compliance, EDD also provides detailed reports to prove no sensitive data was stored on a compromised device during a security incident.
Derek Major is a former reporter for GCN.