BW Offshore is a global provider of floating production services, engineered to progress the future of energy. Founded in 1982, the company is headquartered in Singapore and Oslo, Norway, but operates globally, with a presence in the Americas, Europe, Africa, and Asia.
The Story
Guarantee Uninterrupted Visibility Across Device Fleet
BW Offshore has a global presence, often with multiple worksites and employees travelling around. One of BW Offshore’s biggest challenges was not having visibility into its global device fleet. “I do believe you can’t secure what you can’t see,” explained Peter Tham, Technical Lead, Servers and Hardware at BW Offshore. To mitigate risk and prevent incidents of stolen devices or data from occurring, BW Offshore needed to find a solution that could provide its team with constant endpoint visibility and more security capabilities, including the ability to freeze the device or wipe data remotely.
The Solutions
How They Did It
Improve Missing and Offline Device Return Rates
Absolute Secure Endpoint was recommended to BW Offshore by Dell, which was already embedded in its fleet of Windows devices. Initially, Absolute Secure Endpoint was deployed to BW Offshore’s IT teams’ devices to test out the capabilities. Satisfied with its performance, Absolute Secure Endpoint was deployed to the majority of BW Offshore’s device fleet. Once deployed, BW Offshore’s IT team was surprised to see their device fleet grow, due to some offline devices not being effectively managed or accounted for; many of these devices have been offline for months, some over a year. This kicked off a project to locate and return these offline from various locations across the globe.
Safeguard Devices and Data to Keep Devices Compliant
Now armed with greater visibility and control across its device fleet, BW Offshore is able to see any devices that are non-compliant, with some of these devices having been reformatted outside the company's standard system. With Absolute Secure Endpoint’s remote freeze and file delete capabilities, BW Offshore can freeze and wipe these non-compliant devices, ensuring their data remains secure.
Ensure Mission-Critical Applications Remain Installed and Healthy
In addition to Absolute Secure Endpoint’s ability to monitor, locate, and manage devices on or off the corporate network, BW Offshore also leverages other capabilities provided by this solution. BW Offshore also enables Absolute Application Resilience to ensure its critical applications remain installed and in a healthy state, while also repairing any applications that are not working well, helping reduce IT support time. BW Offshore also leverages Absolute’s End User Messaging capability to send a message to users with malware detected on their device; this allows the BW Offshore IT team to remotely freeze the device while waiting for the user to respond, further preventing the malware from spreading or escalating.
The Results
Complete Control of Endpoints Saves Time and Money
Now that BW Offshore has improved insights from Absolute Secure Endpoint into the devices that have been collected and not fully utilized, they have plans to launch an asset management system to better understand the devices they have in place and how they can be used or repurposed, saving IT time and money in purchasing new devices.
For the BW Offshore team, Absolute Secure Endpoint:
- Provides complete visibility across entire device fleet, whether on or off the corporate network
- Streamlines missing or offline device reclamation process, saving the IT team time and money
- Informs users of important messages regarding their device
- Enables IT to remotely freeze at-risk devices and remotely delete data, keeping devices secure
- Repairs mission-critical applications when they have been disabled or not running in a healthy state
Absolute Platform FAQ
The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.
The Absolute Platform consists of three core components:
- Absolute Persistence Technology
Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.
No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.
- Absolute Resilience Technology
The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:
- Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
- Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
- Absolute Intelligence
Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.
Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:
- Web console
- Mobile app
- Rules and policy engine
- Alerts
- Dashboards
- APIs
- Application Persistence-as-a-Service SDK
- Third-party integrations (e.g., SIEM, ITSM)
Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Secure Endpoint
Mitigating Zero-Day Threats in a Complex Cybersecurity LandscapeLive Webinar - Sept 17, 2024 | 9AM PT
Secure Access
Leveraging AI to Protect Against Modern Cybersecurity ThreatsLive Webinar - Oct 1, 2024 | 9AM PT
Not ready for a demo? Have some questions?