Using Endpoint Data as an Investigative Tool
January 27th, 2014
by Geoff Glave, Senior Product Manager at Absolute Software
The majority of organizations have procedures in place to keep data secure in the event a mobile device is lost or stolen or if an employee is suspected of suspicious behavior. However, these processes often overlook the investigative potential of existing data that is already available within IT.
Absolute Software has specialized in endpoint security for over 20 years. During this time, we’ve been able to identify trends and activities based on data collected from endpoints, that alert our customers to potential security incidents – often before they can occur. Existing data can also be used after an incident to identify non-compliant user behavior, policy violations, whether corporate data was accessed, and other details that could mitigate the impact of regulatory penalties.
Join me at the Absolute Software display during the 15th annual Privacy & Security Conference in beautiful Victoria, BC, February 5th-7th 2014 where we can discuss:
- Proactive measures that will guard against data breaches, rogue employees and other security risks
- The value of a persistent connection with each endpoint, regardless of user or location
- War zone IT security measures
- Real life examples of security incidents and how endpoint data impacted the outcome
Stop by our booth (#26) at the conference to learn more or view our recent webinar: CSI Techniques for IT Security.
by Geoff Glave, Senior Product Manager at Absolute Software
The majority of organizations have procedures in place to keep data secure in the event a mobile device is lost or stolen or if an employee is suspected of suspicious behavior. However, these processes often overlook the investigative potential of existing data that is already available within IT.
Absolute Software has specialized in endpoint security for over 20 years. During this time, we’ve been able to identify trends and activities based on data collected from endpoints, that alert our customers to potential security incidents – often before they can occur. Existing data can also be used after an incident to identify non-compliant user behavior, policy violations, whether corporate data was accessed, and other details that could mitigate the impact of regulatory penalties.
Join me at the Absolute Software display during the 15th annual Privacy & Security Conference in beautiful Victoria, BC, February 5th-7th 2014 where we can discuss:
- Proactive measures that will guard against data breaches, rogue employees and other security risks
- The value of a persistent connection with each endpoint, regardless of user or location
- War zone IT security measures
- Real life examples of security incidents and how endpoint data impacted the outcome
Stop by our booth (#26) at the conference to learn more or view our recent webinar: CSI Techniques for IT Security.