Assala Energy is an oil exploration and production company acquiring mature oil and gas assets in Africa. Assala Energy’s operational strategy is to increase production safely while ensuring integrity. Headquartered in London, Assala Energy’s oil fields are based in Gabon.
The Story
Guarantee Endpoint Visibility Across Remote Oil and Production Fields
Assala Energy has five oil fields and production sites in Gabon. These sites are very remote; some are in the middle of the jungle, which can be accessed via a four-hour boat or helicopter ride. Because of these remote locations, communication and asset management are challenging for Assala Energy. They needed to find a solution that would allow them to get a handle on their assets in these remote locations and track and locate missing devices.
The Solutions
How They Did It
Improve Hardware Inventory and Asset Control
One of the challenges Assala Energy needed support with was asset control. “It’s a whole logistical nightmare of having such remote sites,” says Kevin Turnbull, Global IT Director at Assala Energy. They did not have visibility into where these devices were, whether they made it to the remote sites, or whether it was in inventory. With Absolute Secure Endpoint, Assala Energy has greater visibility on and off its corporate network, giving the IT team constant reports on hardware inventory and seeing all enrolled devices.
Retain Command of Endpoints, No Matter Where They Are
In addition to asset control, Assala Energy also leverages Absolute Control capabilities to safeguard devices, applications, and data. Due to the remote environments of the oil fields, devices may go missing or get stolen. With Absolute, not only does Assala Energy have the endpoint visibility needed to get a handle on where devices are, but also the ability to remotely freeze at-risk devices, notifying users with custom messages.
Define Geofences to Detect Unauthorized Movement
Assala Energy uses Absolute’s geofencing feature to incorporate the physical location of these devices into its asset management strategy, specifically on hotspots where devices go missing; the geofencing capability provides the Assala Energy IT team with alerts when an endpoint travels through an area indicated as a hotspot, providing them with the ability to monitor the devices more closely.
The Results
Enhanced Asset Management = Safeguarded Devices and Data
In the future, Assala Energy plans to continue to leverage Absolute Secure Endpoint to bolster its asset management and asset tracking strategy. With Absolute, Assala Energy now has peace of mind to retain command of all its endpoints, even off the corporate network.
For Assala Energy, Absolute Secure Endpoint:
- Gives the IT team constant visibility into endpoints
- Reports on hardware inventory
- Tracks and locates all enrolled devices, no matter where they are
- Provides the ability to remotely freeze at-risk devices
- Detects unauthorized device movement with defined geofences and alerts
Absolute Platform FAQ
The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.
The Absolute Platform consists of three core components:
- Absolute Persistence Technology
Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.
No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.
- Absolute Resilience Technology
The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:
- Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
- Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
- Absolute Intelligence
Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.
Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:
- Web console
- Mobile app
- Rules and policy engine
- Alerts
- Dashboards
- APIs
- Application Persistence-as-a-Service SDK
- Third-party integrations (e.g., SIEM, ITSM)
Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Secure Endpoint
Mitigating Zero-Day Threats in a Complex Cybersecurity LandscapeLive Webinar - Sept 17, 2024 | 9AM PT
Secure Access
Leveraging AI to Protect Against Modern Cybersecurity ThreatsLive Webinar - Oct 1, 2024 | 9AM PT
Not ready for a demo? Have some questions?