Smith Anderson is a full-service business and litigation law firm serving regional, national and global companies, with more than one-third of its attorneys having joined from national and international firms. Anchored by more than a century of providing innovative legal solutions, businesses can expect client service excellence, partner-level attention and a highly experienced and deep bench of support at favorable local market rates.
The Story
Simplifying Asset Management
The firm operates in a hybrid IT infrastructure, integrating Microsoft Office 365 into an on-premise environment, with plans to deploy Microsoft Intune. Because of this structure, Smith Anderson’s IT team required an asset management solution that could operate seamlessly under this IT model, keeping their devices and data protected. In addition, Smith Anderson needed to ensure that this solution could also report on the encryption status across all of their devices for insurance purposes.
The Solutions
How They Did It
Protected Devices and Data Provide Peace of Mind
Dell introduced Smith Anderson to the Absolute Secure Endpoint solution. The implementation was seamless and integrated easily into the firm’s IT model; the whole fleet was deployed with the solution in less than two days. Smith Anderson’s IT team stated that the Absolute Secure Endpoint console was simple, easy, and intuitive, allowing for seamless management of all the organization’s endpoints, as well as peace of mind that their devices and data are safe.
Remotely Manage Devices and Easily Prove Encryption
In addition to simplifying the management of the firm’s assets, Absolute Secure Endpoint provides the necessary reports to prove each device’s encryption status. This ensures that should a device be missing, stolen, or damaged, Smith Anderson can easily provide its encryption status, helping expedite the insurance claim process. In addition, Absolute Secure Endpoint can help Smith Anderson track, locate, and freeze missing or unreturned devices, aiding in the protection of the firm’s devices and data.
Seamless Endpoint Management Helps Save Time and Resources
Absolute Secure Endpoint has also freed up resources for Smith Anderson’s lean IT team. Now that the organization has a solution to manage and secure its endpoints, as well as automated reports that provide insight into each device, the IT team can focus their efforts on other initiatives, freeing up time they would have otherwise spent on troubleshooting device issues or understanding whether their tools are working as intended.
The Results
Improved Asset Management = Strengthened Device Security
With Absolute Secure Endpoint, Smith Anderson has full visibility into every device, allowing them to manage their endpoints remotely and have the peace of mind that their tools are working as intended, freeing up more IT time and resources.
For Smith Anderson, Absolute Secure Endpoint:
- Provides a modernized IT strategy, whether on-premises or in the cloud
- Saves the IT team time and resources, spending less time on manually managing endpoints. and more time on other initiatives
- Easily proves device encryption with automated reports
- Allows the IT team to remotely freeze or wipe devices, no matter where they are
- Keeps devices and data protected
Absolute Platform FAQ
The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.
The Absolute Platform consists of three core components:
- Absolute Persistence Technology
Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.
No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.
- Absolute Resilience Technology
The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:
- Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
- Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
- Absolute Intelligence
Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.
Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:
- Web console
- Mobile app
- Rules and policy engine
- Alerts
- Dashboards
- APIs
- Application Persistence-as-a-Service SDK
- Third-party integrations (e.g., SIEM, ITSM)
Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Secure Endpoint
Mitigating Zero-Day Threats in a Complex Cybersecurity LandscapeLive Webinar - Sept 17, 2024 | 9AM PT
Secure Access
Leveraging AI to Protect Against Modern Cybersecurity ThreatsLive Webinar - Oct 1, 2024 | 9AM PT
Not ready for a demo? Have some questions?