Ogletree Deakins is one of the world’s largest labor and employment law firms, representing management in all types of employment-related legal matters. The firm focuses on helping businesses globally to comply with U.S. federal and state laws, as well as labor and employment regulations. With more than 850 lawyers in 53 offices across the United States, Canada, Mexico, and Europe, Ogletree Deakins is the epitome of a modern, global, distributed law firm.
The Story
Manage and Protect a Global Fleet of Devices
The IT team at Ogletree Deakins IT team is responsible for managing over 2,000 endpoints in more than 50 offices—many of which do not have a local IT team. With so many employees working remotely and data scattered on endpoints globally, effective IT asset management and cybersecurity were the highest IT priorities.
Ogletree Deakins takes data protection very seriously and has made it one of the pillars of its technology implementation. Having their own sensitive data secured, complying with regulations such as the General Data Protection Regulation (GDPR) or the Health Insurance Portability and Accountability Act (HIPAA), as well as enforcing active encryption and anti-malware at all times were additional requirements that made it necessary to find a new solution.
The Solutions
How They Did It
Improved Visibility and Control Over All Endpoints
Ogletree’s IT procurement team now has the granularity, visibility, and control they need over their endpoints — even when devices are not connected to their network. Using the power of Absolute Secure Endpoint, Ogletree knows that they have a resilient, granular, and intelligent view of all of their devices. Knowing that they have full visibility of the content on the device regardless of the location of the device, independent if it is on or off the corporate network.
Provide Certainty Over a Device’s Whereabouts
Absolute Secure Endpoint helps Ogletree exponentially narrow the scope of its search should there ever be an issue or risk. Uncertainty about a device’s whereabouts and status has been eliminated. “If we ever had a device that was off our network and was missing or stolen—with Absolute Secure Endpoint, we could easily ‘freeze’ it,” said Mike Fallat, Manager, IT Procurement, Ogletree Deakins.
Asset intelligence was the first step, but the security features were the real differentiating factors. “The application repair and reinstall is exceptionally powerful,” Fallat said. “Not only does it supplement SCCM in terms of data points, but it can keep SCCM itself running and functioning correctly. Another major benefit is the ability to execute scripts with Absolute Reach, which takes Absolute Secure Endpoint to the next level of possibilities.”
Improved Asset Management = Increased Productivity
The evolution of the Absolute dashboard from the original asset management options available such as freezing, perpetually wiping, and recovering data off the devices, to what it is today pleases Fallat. “Now we also have the ability to do an endpoint data discovery, scan the files for sensitive information, and if there is, we can determine that it’s not at risk, along with the flexibility to grade that data and set up the different policies,” Fallat said.
Absolute Secure Endpoint helps Ogletree manage their assets and keep tabs on them from a financial and security standpoint. Productivity has also been increased in multiple ways. Ogletree’s IT team has saved countless hours hunting and cross-checking manually disparate data points to find off-network devices.
The Results
Protected Data and Devices Helps Achieve Compliance
Peace of mind is one of the main benefits that Absolute Secure Endpoint has brought to Ogletree’s IT team regarding risk and compliance.
For the Ogletree Deakins’ team, Absolute Secure Endpoint:
- Provides a resilient, granular, and intelligent view of all their devices
- Improves productivity for the IT team as well as employees
- Eliminates uncertainty about a device’s whereabouts and status
Absolute Platform FAQ
The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.
The Absolute Platform consists of three core components:
- Absolute Persistence Technology
Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.
No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.
- Absolute Resilience Technology
The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:
- Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
- Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
- Absolute Intelligence
Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.
Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:
- Web console
- Mobile app
- Rules and policy engine
- Alerts
- Dashboards
- APIs
- Application Persistence-as-a-Service SDK
- Third-party integrations (e.g., SIEM, ITSM)
Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Secure Endpoint
Mitigating Zero-Day Threats in a Complex Cybersecurity LandscapeLive Webinar - Sept 17, 2024 | 9AM PT
Secure Access
Leveraging AI to Protect Against Modern Cybersecurity ThreatsLive Webinar - Oct 1, 2024 | 9AM PT
Not ready for a demo? Have some questions?