September 27, 2021
3 Min Read
Unlock better security for your remote workforce with enhanced geolocation tracking and customizable geofencing, helping you stay ahead of evolving risks.
As we slowly recover from the pandemic, it’s clear that the future of work is a hybrid one. In these new work- and learn-from-anywhere environments, the hallmark of a successful business or educational organization is being able to provide reliable, resilient work- or learn-from-anywhere experiences that maintain maximum security without compromising end-user productivity.
For IT and security practitioners tasked with managing distributed endpoint fleets, this intrinsic need for flexibility makes the role even more challenging.
One of these challenges is due to location. Employees, without prior approval, may be working from locations that differ from the ones that they were originally assigned, resulting in HR challenges and potential tax repercussions for the organization. Within the Education sector, it is commonplace for students to bring 1:1 devices that were provided to them by their schools to multiple locations. In the past that would typically have been limited to the school and the home, but as routines have changed, so have the locations where students use these devices.
So, in addition to the health of critical security applications and the deployment of patches, a basic indicator of device status that IT and security administrators should monitor is the device’s geolocation. Is that endpoint currently located where it should be? If not, what is the associated risk? Has the device changed location regularly over the last few weeks or months, and are these changes both explainable and acceptable? With any highly-mobile device, there is naturally going to be heightened risk due to the potential use of insecure Wi-Fi networks and the greater chance that devices will be left unattended, get lost, and possibly stolen. As employees tend to store more sensitive data on endpoints (e.g., PII, corporate IP, customer data), a device falling into the wrong hands either physically or through a compromised network connection can quickly lead to financial and reputational repercussions to the organization or school district.
With these challenges in mind, Absolute recently announced significant updates to its Geolocation and Geofencing capabilities, making it easier for IT and security teams to reliably track their endpoints and be instantly notified of suspicious or unauthorized device movement. Absolute Geolocation analyzes multiple datapoints such as Wi-Fi triangulation, GPS coordinates, and IP address to provide the most accurate location reading for any . Absolute’s presence in the firmware of devices shipped by leading system manufacturers ensures the feature is tamper proof, providing a superior location tracking experience when compared with alternative solutions that rely on external tracking devices or software that can be deleted or modified.
In response to the need for greater customizations and security, super administrators can decide whether to assign the same granular permissions to other Absolute administrators or limit their access to high-level geolocation (e.g., state-level versus street-level) to ensure end user privacy is maintained. Some of the key capabilities include:
Absolute Geolocation is available through all Absolute products (Absolute Visibility®, Control®, and Resilience®), while the creation of Location Rules and Geofences is available through Absolute Control and Resilience subscriptions.
As remote and hybrid work environments become permanent fixtures in the workplace, securing endpoints and ensuring visibility are more critical than ever. To keep devices secure and up-to-date, organizations need effective solutions that provide real-time monitoring and customizable data collection. Absolute's enhanced geolocation and geofencing capabilities offer the tools IT and security teams need to stay ahead of potential risks while maintaining compliance and minimizing disruption.
To protect remote workers, businesses can implement key strategies such as securing devices against potential cyber threats. For practical tips on maintaining cybersecurity while working remotely, check out these remote work security tips.
As organizations continue adapting to a work-from-anywhere reality, addressing cybersecurity challenges is vital for ensuring safe and efficient operations. For a deeper dive into the evolving cybersecurity issues of remote work, learn about common cybersecurity challenges of working from anywhere.
By implementing resilient security measures and gaining better visibility into endpoint data, businesses can mitigate risks and foster a safer, more productive workforce.
Unlock the power of Absolute's enhanced geolocation capabilities to take control of your endpoint security and improve visibility across your organization.
Want to stay connected? You’ve got options. Explore our resource library, follow us on LinkedIn, or book a demo to see our solutions in action.
About Absolute
Simply put: we’re undeletable. Embedded in more than 600 million devices, our cyber resilience platform delivers endpoint-to-network access security coverage, ensures automated security compliance, and enables operational continuity. Nearly 21,000 global customers rely on Absolute to protect critical assets and keep security applications running smoothly. Building lasting cyber resilience is our promise — are you ready?
Share this article