Blog

Using Endpoint Data as an Investigative Tool

January 27th, 2014

by Geoff Glave, Senior Product Manager at Absolute Software The majority of organizations have procedures in place to keep data secure in the event a mobile device is lost or stolen or if an employee is suspected of suspicious behavior.  However, these processes often overlook the investigative potential of existing data that is already available […]

-

Three Dimensions of Information Protection

January 17th, 2014

by John Landwehr, VP Government Solutions, Adobe Accidents, malicious insiders, and cyber-attacks have demonstrated the need to better protect sensitive information across organizations and industries– especially when related to personally identifiable information, intellectual property, and national security.  Numerous security products and services are available and frequently used by organizations to address these concerns.  However, these […]

-