Police technology is continually evolving, and the Waterloo Regional Police Service needed a connectivity upgrade to keep up. In addition to their own jurisdiction, their technology decisions would also impact surrounding police agencies through their leading role with the Police Regionalized Information Data Entry (PRIDE), a regional consortium of police agencies.
The Story
Simplify Management and Ensure a Seamless User Experience
Simplifying management and ensuring a seamless user experience are two items on many organizations’ wish lists regarding mobile connectivity. The Waterloo Regional Police Service is no different. As part of PRIDE , the police force knew it required an upgrade to meet its connectivity needs. PRIDE is a consortium of five police services,” explains Dave Timbury, Infrastructure Manager for both Waterloo Regional Police Service and PRIDE. “It’s a cooperative venture. We run the data center and the technology for the four other police services. They’re separate services, with separate Active Directory domains, but we share data.”
However, “we try to keep everybody’s technology the same as far as hardware and software in the vehicles,” according to Mobile Workstation Technician Russ Bishop. Connectivity had been via a private radio system using a licensed spectrum in the 450 MHz range, and as Bishop details, it had met the prior need. “We had pretty good coverage because of the frequency,” Bishop says. “We were dealing with just text back and forth. It was private, so we weren’t worried about it being open to the public. It had aggressive compression and decompression, so there was no way anybody was going to look at the data.” But the limitations were becoming more apparent. “With the ever-evolving police environment, we have to be able to connect to networks outside of our own from time to time,” Bishop declares. “We needed to move forward and were looking at cellular as the next technology to go mainstream.”
The Solutions
How They Did It
Speedy and Seamless Implementation
“Talking to other police agencies in southern Ontario, Absolute’s name came up a lot,” Bishop continues. “So we contacted ConvergentIS here in Canada, who set up a proof of concept for us. Within a day, we had the server set up and within a week we were testing with clients in the field. Within a couple of months, we were in production, rolling it out to our fleet of 240 cars. There were no major hiccups. Right out of the box, Absolute Secure Access worked the way we had hoped.”
Supporting Various Policing Technologies to Improve User Experience With Officers
Bishop ticks off some of the technologies the new implementation supports: dispatch, records management, links to the Ministry of Transportation for driver’s licenses and insurance checks, 3D barcode readers, and two-factor authentication using smart cards. Officers have access to the departmental intranet for accessing email and job-specific information. “We also have license plate reading technology installed in some of our cars,” he adds. “The daily database download can put a strain on the mobile network, but Absolute’s compression reduces that load. There is no impact that our end users see during the course of their shift.”
Secure, Reliable Access for the Anywhere Workforce
The police chief and senior deputies have Absolute Secure Access on their tablets and laptops for security purposes. They can take them outside the office without concerns over the devices being lost or stolen because the device can be logged in only if it connects via the VPN. “Besides,” asserts Timbury, “the biggest advantage for the senior staff is they have persistent connections, they can map drives, they have a full desktop experience. With Absolute Secure Access, it’s as if they’re in the office. It gives us more functionality than just a remote entry.”
The Results
Improved User Experience = Reduced IT Support Tickets
Overall, this seamless user experience is incredibly easy to manage. “I might see one trouble ticket every month or so, and those aren’t really due to Absolute Secure Access, it’s end-user problems,” states Bishop.
For the Waterloo Regional Police Service, Absolute Secure Access:
- Provides resilient connections despite challenging coverage conditions
- Allows controlled access based on organizational role
- Streamlines and simplifies management
Absolute Platform FAQ
The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.
The Absolute Platform consists of three core components:
- Absolute Persistence Technology
Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.
No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.
- Absolute Resilience Technology
The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:
- Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
- Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
- Absolute Intelligence
Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.
Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:
- Web console
- Mobile app
- Rules and policy engine
- Alerts
- Dashboards
- APIs
- Application Persistence-as-a-Service SDK
- Third-party integrations (e.g., SIEM, ITSM)
Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Secure Endpoint
Mitigating Zero-Day Threats in a Complex Cybersecurity LandscapeLive Webinar - Sept 17, 2024 | 9AM PT
Secure Access
Leveraging AI to Protect Against Modern Cybersecurity ThreatsLive Webinar - Oct 1, 2024 | 9AM PT
Not ready for a demo? Have some questions?