Allegis Group is one of the world’s largest privately-held staffing companies. Its specialized network of companies includes Aerotek; TEKsystems; Allegis Global Solutions; Aston Carter; Major, Lindsey & Africa; Allegis Partners; MarketSource; EASi; AllegisBN; and Talent2. The company operates more than 500 offices across 50 countries throughout the Americas, Europe, and Asia. Allegis Group works with more than 20,000 clients, 90,000 contractors, and 15,000 employees.
The Story
Optimize Productivity for Employees off the Corporate Network
With more than 25 years of recruitment and staffing expertise globally, Allegis Group has earned itself a reputation for providing professional talent solutions. The company serves its customers through several business units that provide staffing services and solutions to a wide range of industries.
As Allegis Group expanded globally and engaged with new contractors in different regions, the number of remote staff increased. IT was tasked with putting in place architecture that optimizes productivity for employees working off the corporate network. In addition, Allegis Group needed to address the integrity of its data security, with many employee devices containing personally identifiable information. The company required a comprehensive and streamlined security protocol to ensure the protection of this data on behalf of its business partners and clients.
The Solutions
How They Did It
Improve Asset Management and End User Operations
As part of building a world-class security infrastructure, Allegis Group enlisted Absolute Secure Endpoint to serve as a critical layer in its overall security posture. “We follow and adhere to a comprehensive security incident response plan through our service desk system,” said Jeff Reinsfelder, Infrastructure Distribution Manager at Allegis Group. “In the event of a security incident, a ticket is automatically generated and distributed to key internal stakeholders to assess the potential risk and the need to take action. Absolute is obviously a key part of this security process.”
Manage and Secure All Endpoints and Validate Encryption Statuses
Absolute worked diligently with Allegis Group’s IT department to identify where Absolute Secure Endpoint could deliver greater value in managing and securing the organization’s assets. An opportunity was also identified to leverage Absolute Secure Endpoint to validate the existence of other business-critical software applications.
Ensure Application Health With Absolute Application Resilience™
For Allegis Group’s remote workforce, the company heavily relies on VPN connectivity to optimize employee productivity. When the company experienced challenges verifying the health of the VPN client, Absolute Secure Endpoint delivered an Absolute Application Resilience™ module as part of its Application Resilience catalog. This allowed Allegis to automatically repair and/or reinstall the VPN application in the event that the application is uninstalled, inactive, or disabled on any device.
The Results
Improve Security Posture While Instilling Peace of Mind
The bottom line: using Absolute allowed the Allegis Group to improve security and feel confident that their devices and data were protected.
For Allegis Group, Absolute Secure Endpoint:
- Validates the encryption status of devices
- Automatically reinstalls business-critical software that is covered in the Absolute Application Resilience catalog
- Instills peace of mind for partners and business clients
Absolute Platform FAQ
The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.
The Absolute Platform consists of three core components:
- Absolute Persistence Technology
Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.
No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.
- Absolute Resilience Technology
The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:
- Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
- Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
- Absolute Intelligence
Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.
Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:
- Web console
- Mobile app
- Rules and policy engine
- Alerts
- Dashboards
- APIs
- Application Persistence-as-a-Service SDK
- Third-party integrations (e.g., SIEM, ITSM)
Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Secure Endpoint
Mitigating Zero-Day Threats in a Complex Cybersecurity LandscapeLive Webinar - Sept 17, 2024 | 9AM PT
Secure Access
Leveraging AI to Protect Against Modern Cybersecurity ThreatsLive Webinar - Oct 1, 2024 | 9AM PT
Not ready for a demo? Have some questions?