Centre Hospitalier Universitaire (CHU) de Clermont-Ferrand is the largest hospital in the Auvergne region of central France. It has around 6,000 medical and administrative staff supporting some 2,000 patients and providing a broad range of healthcare services to people in the area.
The Story
Keep Endpoints Protected While Reducing Theft
CHU de Clermont-Ferrand has around 4,000 devices used by administrators for running the hospital and by clinicians for delivering healthcare services within the hospital campus and in the local community that the hospital serves. While most of these computers are located in secure, staff-only parts of the hospital, a number are used in more public places, with several laptops used both on- and off campus.
The hospital was losing an average of two devices each month to theft. Sensitive patient data was secured as it was hosted in the hospital’s data center, but device theft created a considerable disruption to the end user’s work, not to mention the extra IT resources required to replace and configure a new device each time. Hervé Grandjean, Head of Administrative Information and Services for CHU de Clermont-Ferrand, needed to find a practical and cost-effective way to secure his endpoints.
The Solutions
How They Did It
Unique, Patented Technology Delivers an Always-On Connection
CHU de Clermont-Ferrand deployed Absolute Secure Endpoint on 270 of the most vulnerable PCs and laptops in deployment which are used by staff in public areas and out in the community. As a result of Absolute’s partnerships with leading device manufacturers, Absolute Persistence® technology is embedded into the firmware of devices at the factory.
If the agent has been removed or the hard drive is completely reformatted or replaced, Persistence technology ensures that it is automatically reinstalled. “We think Absolute is a very effective solution because it can’t be removed, even when the operating system or hard drive is reinstalled,” said Grandjean.
The Results
Reduced Theft = Saved Time and Money
By leveraging Absolute, the hospital was able to improve productivity, increase efficiency, and enhance its reputation for security.
For CHU, Absolute Secure Endpoint:
- Helps establish a safer environment, with CHU experiencing lower occurrences of theft
- Saves the time and money involved in replacing and configuring replacement due to its improved ability to recover devices
- Reduces end user disruption caused by device theft
Absolute Platform FAQ
The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.
The Absolute Platform consists of three core components:
- Absolute Persistence Technology
Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.
No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.
- Absolute Resilience Technology
The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:
- Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
- Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
- Absolute Intelligence
Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.
Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:
- Web console
- Mobile app
- Rules and policy engine
- Alerts
- Dashboards
- APIs
- Application Persistence-as-a-Service SDK
- Third-party integrations (e.g., SIEM, ITSM)
Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Secure Endpoint
Mitigating Zero-Day Threats in a Complex Cybersecurity LandscapeLive Webinar - Sept 17, 2024 | 9AM PT
Secure Access
Leveraging AI to Protect Against Modern Cybersecurity ThreatsLive Webinar - Oct 1, 2024 | 9AM PT
Not ready for a demo? Have some questions?