Corporate

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce augue justo, viverra at luctus vitae, dapibus eu odio. Morbi vestibulum orci neque, vulputate pharetra purus fringilla in.

Absolute Insight Gives 360º Visibility to MSPs
Absolute Insight Gives 360º Visibility to MSPs

Absolute Software is pleased to launch our latest tool for IT administrators, Absolute Insight, a comprehensive web-based endpoint monitoring, security management solution for managed service providers (MSPs). With Absolute Insight, MSPs have a 360 degree view of each IT asset in all customer deployments, including relationships and dependencies within the organization based on information from hardware, software, active directory, HR, procurement, and other data sources. Using a cloud-based console,...

READ MORE
A Decade of Data Breaches
A Decade of Data Breaches

Data Breaches have evolved in the past 10 years. It’s hard to imagine that just 10 years ago, data breaches were just emerging as a threat to businesses. Fast forward 10 years and data breaches are one of the top threats affecting businesses, with the form of data breach constantly evolving as more data is stored, transported and accessed. To put the evolution of data breaches into perspective, ID...

READ MORE
Lost and Stolen Devices Top Corporate Mobile Security Concern
Lost and Stolen Devices Top Corporate Mobile Security Concern

InformationWeek recently released its 2013 State of Mobile Security report outlining how businesses are using mobile devices and how these devices have impacted security. According to the survey, 68% of organizations support BYOD in some form, with an additional 20% developing BYOD policies. Given the now widespread adoption of mobile devices, particularly devices managed through BYOD programs, it is not surprising that the top corporate mobile security concern is...

READ MORE
Common IT Mistakes that Lead to Data Loss
Common IT Mistakes that Lead to Data Loss

The goal of data loss prevention (DLP) is to set up a system and set of procedures to prevent and detect potential data breaches in all data states, in-use (endpoint), in-motion (network) and at-rest (storage). Not all loss of data is related to data breaches; in some cases, data loss can be an internal issue, though one with widespread repercussions. If vital data becomes corrupted, and is not backed up,...

READ MORE
Mobile Device Information Security Risks
Mobile Device Information Security Risks

Zone Alarm recently grouped some statistics on the Impact of Mobile Devices on Information Security into an infographic that covers many common security concerns. As you can see in the infographic below, businesses are allowing BYOD programs to run without proper device and data security, allowing data of all kinds to reside on personal devices. With 79% of companies reporting mobile security incidents in the past year and 42% of...

READ MORE