The Oregon State Police (OSP) provides critical public safety services to citizens and public safety partners across the state of Oregon. To better serve the public, the police force needed to simplify secure access to networks and enable them to access information faster.
The Story
Keeping Officers Connected No Matter Where They Are
Oregon state troopers and other field employees regularly work from their vehicles, relying on public cellular networks to access central information systems and databases while on the road. However, weak and intermittent connectivity threatened the organization’s commitment to “be there” for the citizens of Oregon. In Eastern Oregon and other rural areas of the state, cellular coverage is often spotty or weak. For members of the OSP, a lost connection is a serious problem that puts their own safety at risk and negatively impacts call response times. Operating far beyond the reach of the IT support staff, officers would have to stop what they’re doing to try and reestablish a broken connection on their own.
OSP CIO Albert Gauthier wanted to find a way to keep officers connected. Ensuring that employees—regardless of their physical location or route—are connected to mission-critical systems was going to require a level of visibility OSP had never had before. Gauthier and his team began looking for a tool that would provide the details of individual cellular connections. The team wanted enough information to avoid known issues and quickly find the root of new problems, so they could provide fixes immediately.
The Solutions
How They Did It
Addressing Network Problems to Improve Productivity
OSP, a long-time user of Absolute Secure Access, decided to evaluate the company’s latest solution, Absolute Insights for NetworkTM, which quickly pinpoints and analyzes the root causes of mobile connectivity and wireless networking problems to improve the productivity of mobile users. Impressed with the results, OSP proceeded with a statewide deployment. "Absolute Secure Access confirmed very quickly that we had areas of low bandwidth performance near the city of Bend,” added Gauthier. “Once we were able to document this issue repeatedly – using multiple officers traversing the region – we wanted to include our carrier in the conversation. Having aggregate data of this nature was particularly powerful."
Unparalleled Insights Increases Visibility for IT Teams
Using a small agent on mobile devices, the solution collects performance and location information, giving IT staff the ability to see the conditions their mobile field workers are experiencing. Using this data, the solution builds data coverage maps, generates detailed device, network, and application reports, tracks air card and modem usage, and exposes poor network performance. OSP shared a coverage report with its carrier, prompting an internal evaluation. The carrier confirmed the problem and informed OSP of plans to install three new tower sites across the region.
Improved Troubleshooting Helps Eliminate Connection Issues
The technology allows OSP to quickly determine the cause of cellular connectivity issues for individual users. Real-world data helps the IT team determine if the problem sits at the application, network, or device level. Being able to verify field performance is a critical factor for OSP, as it evaluates applications and devices against changing needs. It is also key to engaging carriers, as well as internal management, to coordinate and meet the team’s increased coverage needs. Using Absolute Secure Access, OSP plans to keep track of data consumption, so applications can be prioritized across the bandwidth that is available.
The Results
Secure Connectivity Keeps Officers Safe
The solution’s inventory control plays a big role in helping with connection issues. “When troubleshooting, it’s nice to be able to quickly view a device’s firmware and other details all in one place,” said Gauthier. “This product has been a boon for us; it provided really good value, really quickly. Overall, thanks to Absolute Secure Access, we’re a lot smarter and data-driven in the mobility-related decisions we make.
For OSP, Absolute Secure Access:
- Increases patrol time for deputies
- Simplifies access through single log-in
- Reduces IT tickets through continuous connectivity
- Centralizes management console for troubleshooting and monitoring
Absolute Platform FAQ
The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.
The Absolute Platform consists of three core components:
- Absolute Persistence Technology
Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.
No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.
- Absolute Resilience Technology
The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:
- Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
- Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
- Absolute Intelligence
Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.
Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:
- Web console
- Mobile app
- Rules and policy engine
- Alerts
- Dashboards
- APIs
- Application Persistence-as-a-Service SDK
- Third-party integrations (e.g., SIEM, ITSM)
Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Secure Endpoint
Mitigating Zero-Day Threats in a Complex Cybersecurity LandscapeLive Webinar - Sept 17, 2024 | 9AM PT
Secure Access
Leveraging AI to Protect Against Modern Cybersecurity ThreatsLive Webinar - Oct 1, 2024 | 9AM PT
Not ready for a demo? Have some questions?