Research Report
Absolute Security Named a Sample Vendor for ASCA by Gartner
ASCA Mentioned Again in Latest Gartner® Hype Cycle™ for Endpoint and Workspace Security
Time to read: 90 mins
Absolute Security Named a Sample Vendor in the Latest Gartner Hype Cycle
Businesses require robust security measures to prevent breaches, especially as attackers leverage AI for sophisticated phishing and endpoint attacks. With numerous cybersecurity innovations emerging, it’s crucial for security leaders to focus on comprehensive strategies to keep pace with evolving threats. Gartner Hype Cycle for Endpoint & Workspace Security assists security and risk management leaders in pinpointing technologies that strengthen endpoint and workspace defenses.
For the second year in a row, Absolute Security has been named a Sample Vendor for Automated Security Control Assessment (ASCA). Gartner defines ASCA as a technology that continuously analyzes, prioritizes and optimizes security controls to reduce an organization’s threat exposure. ASCA identifies configuration drift, policy and control deficiencies, detection logic gaps, poor defaults, and other misconfigurations in security controls. It then uses identified weaknesses to recommend and prioritize remediation steps to improve security against organization-specific threats.
Key findings from the report include:
- The complexity of managing security control configurations continues to grow with emerging threat vectors, the proliferation of security tools, and the high turnover of administration staff, leading to a more exposed attack surface
- Manual configuration reviews, occasional penetration tests or siloed, tool-centric administration of security controls are insufficient in the face of rapidly changing attack techniques
- Reduce complexity by pursuing security vendor consolidation or considering alternatives, such as “policy as code,” to manage security configurations
To learn more about why ASCA is important to reduce an organization’s attack surface, why we believe it must be considered an emerging cybersecurity component of today’s endpoint security best practices, and why Absolute Security is named a Sample Vendor, download the Gartner Hype Cycle for Endpoint and Workspace Security, 2024.
Gartner, Hype Cycle for Endpoint and Workspace Security, 2024, Franz Hinner, Chris Silva, 8 August 2024
GARTNER is a registered trademark and service mark of Gartner and Hype Cycle is a registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Learn more about Absolute Cyber Resilience
The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.
The Absolute Platform consists of three core components:
- Absolute Persistence Technology
Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.
No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.
- Absolute Resilience Technology
The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:
- Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
- Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
- Absolute Intelligence
Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.
Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:
- Web console
- Mobile app
- Rules and policy engine
- Alerts
- Dashboards
- APIs
- Application Persistence-as-a-Service SDK
- Third-party integrations (e.g., SIEM, ITSM)
"ASCA reduced the organization’s risk of business disruption and financial loss by optimizing security controls and reducing exposure to threats. Organizations implementing ASCA technologies enhance staff efficiency, minimize the impact of human errors and improve resilience in the face of organizational churn."
Gartner Hype Cycle for Endpoint and Workspace Security, 2024