![](/media/8731/broomecounty-logo.png)
Broome County is a county in New York, USA that relies on continuous connectivity for its frontline workers to better serve its citizens and ensure the safety of its deputies.
The Story
Reliable and Secure Connectivity for the Mobile Workforce
Like many government offices, Broome County maintains a hybrid working model. Their Chief Information Officer, Faisal Shah, supports 41 departments, from the Sheriff’s Office to Animal Shelters. Broome County has multiple physical offices and data centers as well as employees who work remotely and onsite. To support and maintain this hybrid working model, it is imperative Broome County leverages a remote access solution that does not compromise security and keeps employees connected.
The Solutions
How They Did It
Improving Connectivity and Security for Frontline Officers
Absolute Secure Access was initially introduced to support Broome County’s public safety branch, specifically for their emergency services to ensure their frontline workers remained connected. After implementing Absolute Secure Access, connectivity for frontline workers has improved drastically. Within Broome County, there are many dead zones and areas without Internet access; with Absolute Secure Access, frontline workers are ensured that no matter where they are, their secure data can be viewed and uploaded.
Maintaining Uninterrupted Network Connections for the Anywhere Workforce
As part of Faisal Shah’s efforts to modernize Broome County’s IT strategy, a key component is to ensure their vendors are nimble – easy to work with and with a presence on-premises and in the cloud. With Broome County under a hybrid working model, Absolute Secure Access can provide a remote access solution that allows users to connect from anywhere, whether from one of Broome County’s offices, a coffee shop, a hotel, or an employee’s home, without compromising on security.
Paving the Way for a Zero Trust Architecture
Another component of Broome County’s efforts to modernize its IT strategy is to move towards a zero trust security posture. “[A zero trust security posture] is something that is very important to me,” says Faisal Shah. Particularly within Broome County’s public safety branch, frontline workers move from town to town. Faisal Shah was looking for a solution that ensures employees’ identities cannot be forged or duplicated. Knowing Absolute Secure Access can provide what Broome County was looking for, Faisal Shah plans to increasingly leverage Absolute ZTNA down the road.
The Results
Modernizing the County’s IT Strategy
As part of Broome County’s ongoing efforts to adopt an agile IT strategy, Absolute Secure Access provides the resilient network capabilities needed for frontline officers but also paves the way for ZTNA and secure remote access for all the county’s departments.
For Broome County, Absolute Secure Access:
- Improves daily operations for emergency services with secure remote access, without compromising security
- Provides stable and reliable connectivity for hybrid employees, no matter where the user is
- Helps transforms the county’s IT strategy, including future plans to move to a Zero Trust architecture
![](/media/8736/pt-broome-county-cs.png)
Absolute Platform FAQ
The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.
The Absolute Platform consists of three core components:
- Absolute Persistence Technology
Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.
No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.
- Absolute Resilience Technology
The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:
- Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
- Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
- Absolute Intelligence
Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.
Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:
- Web console
- Mobile app
- Rules and policy engine
- Alerts
- Dashboards
- APIs
- Application Persistence-as-a-Service SDK
- Third-party integrations (e.g., SIEM, ITSM)
Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Secure Endpoint
Ensuring Critical Security & Productivity Applications are FunctioningLive Webinar - July 23, 2024 | 9AM PT
Secure Access
Network Performance & Diagnostics for Today’s OrganizationsLive Webinar - July 16, 2024 | 9AM PT
Not ready for a demo? Have some questions?