UBM: TECH DIGITAL RESOURCE LIBRARY

Absolute Software

Absolute Software Corporation is the industry standard in persistent endpoint security and management solutions for computers, laptops, and ultra-portable devices-and the data they contain. Absolute Software has been the leader in device security and management for 20 years. Our persistence technology is built into tens of millions of devices around the world

Our Website: http://www.absolute.com


Latest Content From Absolute Software

Whitepaper: Achieving HIPAA Compliance

by Absolute SoftwareJan 05, 2016

On September 23, 2013, new rules were implemented to ensure that healthcare organizations, as well as their business associates and subcontractors, are compliant with HIPAA regulations to secure personal health information (PHI). Compliance with data protection regulations has never been more important, nor more difficult with the rise of the mobile workforce. Learn about the consequences of these new regulations and how organizations can change their IT methodologies to protect sensitive data and avoid costly breaches.


Whitepaper: The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices

by Absolute SoftwareJan 05, 2016

IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations. Download this white paper to read about some of the most costly data breaches that resulted from lost or stolen devices.


Research Report: The Future of Data Security and Privacy: Growth and Competitive Differentiation

by Absolute SoftwareJan 05, 2016

Almost every firm, from an online retailer to a hospital to a government agency, rarely works in isolation and can rarely confine data to within their four walls. The walls don't exist. They must work in a complex ecosystem of customers increasingly concerned about their privacy, digitally native employees, and demanding partners and suppliers--all perpetually connected by new systems of engagement and cloud services. In this new reality, traditional perimeter-based approaches to security are outdated. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model.


Whitepaper: HIPAA Violations Incur Multi-Million Dollar Penalties

by Absolute SoftwareJan 04, 2016

HIPAA regulations have undergone major changes in the last few years, giving both the federal and state Governments new powers and enhanced resources to pursue HIPAA violations. Read about some recent breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance.


Whitepaper: Extend Compliance And Risk Management To What Really Matters For Your Business

by Absolute SoftwareSep 29, 2014

While governance, risk management, and compliance (GRC) programs have matured well over time, this maturity has come mostly in response to new and changing regulations, which has resulted in programs that are narrowly focused on protecting employees, investors, consumers, and other stakeholders - not on protecting the business itself. Companies rarely fail because of poor financial controls, but they fail frequently due to their inability to understand and address disruptive technologies, market fluctuations, changing customer expectations, and competitive pressures.


Whitepaper: Endpoint Security Trends

by Absolute SoftwareSep 29, 2014

This report outlines Forrester's take on the endpoint security trends seen from Q2 2013 to Q4 2014, looking at IT spend, and the adoption of Endpoint Security Software-As-A-Service. Forrester provides data for organizations to benchmark their spending patterns against their peers, and strategize their endpoint security adoption decisions.


Whitepaper: Responding to Unpopular HIPAA Disclosure Requirements

by Absolute SoftwareSep 25, 2014

The question is not whether healthcare consumers will ultimately get the right to learn of disclosures of their data, but when. Senior IT leaders and business executives in healthcare organizations that use lobbyists should focus on regulators' renewed attention to this long-dormant HIPAA issue.


Whitepaper: IT Leaders in Mobile and Endpoint Computing Should Take Strategic Action in 2014/2015

by Absolute SoftwareSep 15, 2014

As mobile transforms into an overall endpoint-computing strategy, mobile strategy development continues to be a frequent subject for inquiries. IT leaders need to challenge the status quo by embracing endpoint-computing innovation and re-evaluating their strategies every six months.

Read Gartner's report that focuses on five areas that organizations can invest in to ensure success.


Whitepaper: Seven Steps to Creating an Effective Computer Security Incident Response Team

by Absolute SoftwareSep 15, 2014

Chief information security officers (CISOs) and other key security decision makers should follow a phased approach in developing and maintaining a CSIRT that will identify, contain, escalate, investigate and remediate incidents in a timely and efficient manner. Read Gartner's report on how a phased approach to the creation of the team will ensure optimal effectiveness.