Euromonitor International is a leading provider of global business intelligence and strategic market analysis, employing 1,300 people located across 80 countries. Publishing over 17,000 market reports each year covering 27 industries, 200 sub-categories, and thousands of companies, Euromonitor’s reports are widely relied upon globally.
The Story
Ensuring the Security of Research and Data Across Devices
Time is valuable, and at Euromonitor, there was concern about the amount of time IT had to devote to the manual management of its endpoints and the mitigation of risk exposure stemming from stolen laptops and other mobile devices. Ensuring the security of their proprietary market research was a top priority for the company, and the IT team knew they needed a new approach.
In addition to unlocking new efficiencies, the IT team was also in search of a solution that would enable them to define device and application inventory as well as user activity, maintain up-to-date applications on the organization’s device deployment, and track, trace, and remotely wipe sensitive data on at-risk devices, whether they were on or off the corporate network. Their search ended when Euromonitor found Absolute Secure Endpoint.
The Solutions
How They Did It
Remotely Freeze Devices, Anywhere
Euromonitor’s initial interest in Absolute was to address device theft. The company was impressed by the ability of Absolute Secure Endpoint to remotely freeze a device in the event of a security incident and to maintain an always-on connection at all time.
Saving Time With an Asset Management Solution
By working closely with Absolute, Euromonitor discovered that their asset management needs could be satisfied too. “Absolute Secure Endpoint has definitely saved us a lot of time managing our assets and maintaining visibility of them even when they are off the corporate network,” Konigkramer said.
Robust Reporting Helps Verify Software and Endpoint Applications
Absolute Secure Endpoint has helped Euromonitor protect its proprietary research and validate the status of critical software applications. The automated inventory management and reporting capabilities have created efficiencies and cost savings. According to Konigkramer, the customizable reports helped shed light on several inconsistencies within the organization.
“Absolute detected several devices that were operating legacy applications and missing business-critical software,” Konigkramer said. “Once alerted, we were able to respond and correct the situation. This level of visibility has been instrumental in verifying the presence and health of endpoint applications across our entire fleet.”
The Results
Safeguarding Devices, Data, and Proprietary Research
With Absolute Secure Endpoint, Euromonitor addressed its concerns about device theft and asset management and added another layer of protection around its proprietary research.
For the Euromonitor team, Absolute Secure Endpoint:
- Helps Euromonitor validate the status of critical software applications that are covered in the Absolute Application Resilience™ catalog
- Automates inventory management and reporting capabilities, delivering improved IT efficiencies and cost savings
- Gives Euromonitor the ability to remotely freeze a device in the event of a security incident and maintain an always-on connection at all times
Absolute Platform FAQ
The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.
The Absolute Platform consists of three core components:
- Absolute Persistence Technology
Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.
No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.
- Absolute Resilience Technology
The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:
- Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
- Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
- Absolute Intelligence
Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.
Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:
- Web console
- Mobile app
- Rules and policy engine
- Alerts
- Dashboards
- APIs
- Application Persistence-as-a-Service SDK
- Third-party integrations (e.g., SIEM, ITSM)
Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Secure Endpoint
Mitigating Zero-Day Threats in a Complex Cybersecurity LandscapeLive Webinar - Sept 17, 2024 | 9AM PT
Secure Access
Leveraging AI to Protect Against Modern Cybersecurity ThreatsLive Webinar - Oct 1, 2024 | 9AM PT
Not ready for a demo? Have some questions?