by Geoff Glave, Senior Product Manager at Absolute Software
The majority of organizations have procedures in place to keep data secure in the event a mobile device is lost or stolen or if an employee is suspected of suspicious behavior. However, these processes often overlook the investigative potential of existing data that is already available within IT.
Absolute Software has specialized in endpoint security for over 20 years. During this time, we’ve been able to identify trends and activities based on data collected from endpoints, that alert our customers to potential security incidents – often before they can occur. Existing data can also be used after an incident to identify non-compliant user behavior, policy violations, whether corporate data was accessed, and other details that could mitigate the impact of regulatory penalties.
Join me at the Absolute Software display during the 15th annual Privacy & Security Conference in beautiful Victoria, BC, February 5th-7th 2014 where we can discuss:
Stop by our booth (#26) at the conference to learn more or view our recent webinar: CSI Techniques for IT Security.