Lantum is a workforce management platform vendor that allows healthcare providers to mobilize their workforce and allow clinicians to work more flexibly. Headquartered in London, U.K., Lantum is on a mission to radically improve how the healthcare industry connects with the workforce to provide better patient care. The Lantum platform uses advanced technology to help healthcare organisations manage their workforce and connect with a large network of healthcare professionals to fill shift gaps.
The Story
Simplifying Asset Management
With the transition to increased remote work, Lantum required an asset management system that would simplify the process of managing the devices being sent to remote workers, and also the ability to track and locate lost or stolen devices. Lantum also needed a solution that provided control over the device, no matter where the end user was working. Since Lantum works in a cloud-based environment, there were various applications that needed to be installed for users to access. It was imperative to look for a solution that simplified and provided control over managing various scripts to make installation seamless for the end user.
As an ISO 27001-certified company, Lantum must comply with various guidelines when it comes to their IT environment, including device asset management. As part of the governance and audit process, Lantum needs to report on various device insights on an ongoing basis, which became a time-consuming operation. Finding a solution that could simplify this process was a priority to help free up resources to work on other initiatives.
The Solutions
How They Did It
Improving Visibility into the Device Fleet
As a solution, Absolute Secure Endpoint was introduced by Appurity, Lantum’s trusted technology partner. Appurity knew the capabilities of the solution; it could provide the endpoint visibility and control needed over Lantum’s device fleet and allow for a more granular view of the device and applications from a compliance perspective, versus a Mobile Device Management provider.
With the help of Appurity, Lantum went through a seamless implementation and installation process of Absolute Secure Endpoint across its device fleet. This allowed for gradual adoption across the organization, providing Lantum with immediate visibility and control over their devices and what is installed, even with a distributed workforce.
Maintaining Compliance with Robust Reporting
In addition, Lantum will soon be undergoing their next ISO 27001 audit followed by a renewal of their Cyber Essentials certification. With Absolute Secure Endpoint, Lantum can easily provide the necessary evidence for audit purposes in an efficient and scalable manner.
As a scaling business, Lantum needed a solution that could help reduce some of the workload on their compliance team. Since implementing Absolute Secure Endpoint’s efficient reporting, Lantum’s compliance team has been able to focus on other strategic initiatives.
Safeguarding Devices and Data from Unwanted Threats
Lantum also works closely with the NHS, who have been ensuring their vendors have the solutions in place to protect their critical infrastructure from outside threats. Absolute Secure Endpoint provides Lantum with the confidence to meet not only this need but to also be prepared to meet any future demands. Lantum has contractual obligations where Lantum is scored on various aspects including Cyber Essentials. Absolute Secure Endpoint provides Lantum with the ability to achieve and maintain these scores, making it easier for organizations to easily procure their product.
The Results
Resilient Endpoints and Applications for the Anywhere Workforce
With Absolute Secure Endpoint, organizations can make their endpoints and applications cyber resilient while staying compliant in support of their “anywhere” workforce.
For Lantum, Absolute Secure Endpoint:
- Provides improved visibility into the device fleet, providing full device tracking to help locate lost or stolen endpoints
- Efficiently provides a streamlined collection of evidence to help achieve and maintain compliance
- Helps safeguard devices, applications, and data from unwanted threats
Absolute Platform FAQ
The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.
The Absolute Platform consists of three core components:
- Absolute Persistence Technology
Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.
No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.
- Absolute Resilience Technology
The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:
- Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
- Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
- Absolute Intelligence
Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.
Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:
- Web console
- Mobile app
- Rules and policy engine
- Alerts
- Dashboards
- APIs
- Application Persistence-as-a-Service SDK
- Third-party integrations (e.g., SIEM, ITSM)
Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Secure Endpoint
Mitigating Zero-Day Threats in a Complex Cybersecurity LandscapeLive Webinar - Sept 17, 2024 | 9AM PT
Secure Access
Leveraging AI to Protect Against Modern Cybersecurity ThreatsLive Webinar - Oct 1, 2024 | 9AM PT
Not ready for a demo? Have some questions?