ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Absolute Software Corporation

  • Apria Healthcare Delivers Secure Health Solutions with Absolute

    Apria Healthcare, an at-home clinical services provider, needed to keep their employee’s laptops and other mobile devices secure, especially since their employees are dispersed throughout the United States. Learn how Absolute was able to support Apria with their security needs and keep them in compliance with HIPAA and other healthcare regulations.

  • Baltimore City Public School System Delivers Secure Technology to the Classroom

    The IT team of the Baltimore City Public School System was faced with the difficult task of ensuring that all school devices – and the sensitive data that they contained –were secured and accounted for. Learn how Absolute helped the school system reduce the risks and costs associated with laptop theft, ensure data protection on devices, and more.

  • Absolute Maximizes Klein Independent School District One-to-One Program

    Learn how Absolute allowed the Klein Independent School District (ISD), of Texas to deploy a successful one-to-one computing program with student device security and privacy.

  • Allina Health Ensures HIPAA Compliance

    Major healthcare provider, Allina Health, employs a large, highly mobile team who use devices that are often off the corporate network. Therefore, having visibility and control of their entire device fleet at all times is a necessity. With Absolute, Allina Health has been able to do so. Read on to learn how.

  • Absolute Enables Personalized Learning Program at Loudoun County Public Schools

    Loudoun County Public Schools wanted to replace their desktops with tens of thousands of laptops. But they needed a solution that would help them prevent device theft and secure sensitive data. Learn how the implementation of Absolute gave the school district a peace of mind of endpoint security, device theft recovery, and data privacy.

  • Greenville Health System

    In this case study, discover how Greenville Health, a not-for-profit healthcare network, partnered with Absolute to gain continuous visibility of their remote devices and data in order to strengthen their security posture while ensuring HIPAA compliance.

  • Wichita State University

    In this case study, discover how Wichita State University’s (WSU) IT team partnered with Absolute to establish endpoint visibility and control protocols in order to protect their students and faculty while meeting compliance requirements.

  • Emergency Communications of Southern Oregon

    In this case study, discover how Emergency Communications of Southern Oregon (ECSO), an emergency dispatch facility, was able to save lives through their partnership with Absolute by ensuring endpoint visibility and security to increase efficiency and meet CJIS compliance.

  • Achieving HIPAA Compliance

    Tap into this HIPAA Compliance Guide to see how Absolute can help you eliminate compliance failures and provide you with endpoint visibility and control.

  • NIST Cybersecurity Framework Evaluation Guide

    The NIST Cybersecurity Framework (CSF) outlines specific actions and guidelines for organizations to undertake in order to improve security hygiene and meet regulatory requirements. In this evaluation guide, take a closer look at the 5 pillars of the NIST CST and learn how the Absolute platform aligns with the action items.

  • Creative Lodging Solutions

    In this case study, discover how Creative Lodging Solutions (CLS), a travel management company, partnered with Absolute to establish control and visibility of their endpoints to eliminate blind sports and protect intellectual property.

  • Asplundh Tree Expert

    In this case study, discover how Asplundh, a vegetation management organization, partnered with Absolute to establish inventory management and secure the devices of their increasingly distributed workforce.

  • Data Breach Prevention for Healthcare

    Stolen medical records sell for up to $500/record on the black market, making healthcare providers the top target for cybercrime. Additionally, organizations need to ensure they are meeting increasingly strict compliance standards. Download this white paper to explore how to safeguard your patient records against data breaches.

  • How to Provide a Safe Learning Environment

    Technology has become a fundamental part of the education system, and it’s likely to continue as a classroom trend. However, these devices also present risks to students and schools. Download this white paper to uncover 3 approaches your organization should adopt in order to ensure a safer learning environment.

  • Euromonitor

    In this case study, discover how Euromonitor, a business intelligence and strategic analysis provider, partnered with Absolute to shift their security focus towards their proprietary market research and automate endpoint visibility to track (and potentially wipe) at-risk devices.

  • KCOM

    In this case study, discover how KCOM, a UK-based systems integrator, partnered with Absolute to address the increasing demands of their increasingly dispersed workforce without sacrificing compliance or operational efficiency.

  • NIST Cybersecurity Framework Implementation Overview

    In 2018, the National Institute of Standards and Technology (NIST) revised their cybersecurity framework (CSF) to reflect today’s threat landscape. This white paper outlines the 5 functions of the NIST CSF, specifically for endpoints, and provides actionable guidelines for implementation. Read on to get started.

  • CIS Critical Security Controls Evaluation Guide

    The Center for Internet Security (CIS) Critical Security Controls have become a trusted resource for organizations looking to identify threats and enhance security. This evaluation guide measures the Absolute Platform against the CIS Top 20 Critical Security Controls to illustrate its capabilities.

  • Global Law Firm Secures Client Data and Achieves Compliance

    In this case study, learn how Absolute helped Ogletree Deakins, one of the largest global law firms, keep their data secure and remain compliant with regulations such as the GDPR.

  • HIPAA Compliance Evaluation Guide

    To comply with the HIPAA Privacy Rule and Security Rule, Covered Entities (CEs) and their business associates must implement administrative, physical, and technical safeguards across their endpoint populations. In this guide, see how Absolute can help.

  • Effective Healthcare Data Breach Response

    Because medical data is so valuable, the FBI has warned that cybercriminals are targeting healthcare providers more than any other industry. Luckily, this white paper outlines 6 steps to effective data breach response. Read on to make sure you have the right plan of action in case of a breach.

  • 3 Overlooked Data Privacy Considerations

    This e-book explores what personal privacy means in a ‘dematerialized’ world and draws attention to 3 aspects of data protection that often go overlooked. Read on to learn more.

  • Indiana Charter School Network with Goodwill Industries

    Goodwill Industries of Central Indiana is a non-profit social enterprise that partners with the Indiana Charter School Network to support over 3,300 students spread across 11 schools. Learn how Absolute helped the schools and Goodwill decrease theft of devices used by students, maintain network compliance, and better manage hardware inventory.

  • 2019 Endpoint Security Trends Report

    This endpoint security report outlines the findings from extensive primary research analyzing more than six million enterprise devices over a one-year period. Read on to learn why much of endpoint security spending is voided today.

  • Data Breach Response Revisited

    Learn how your organization can revisit your incident response plans and be prepared to detect, respond, and recover as quickly as possible.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.