SlideShare a Scribd company logo
Absolute Software
Governance
Risk
Compliance

Sebastien Roques
Senior Territory Account Executive
France-Iberia & NWA| Absolute Software EMEA Ltd.
About Absolute Software

Nearly two decades securing and managing diverse endpoints
Absolute Software: Track. Manage. Secure.
Endpoint Security
Centrally track and secure IT assets within a cloudbased console.
Remotely manage and administer
self-encrypting drives built into new computers.

Endpoint Management
Manage PC, Mac, Android, iOS and Windows
Phone devices to take strategic and responsive
action.
IT Service Management
Predict potential points of failure and make realtime decisions using ITIL certified best practices.
Many Devices. One Solution. Two Magic Quadrants.

4
Absolute Computrace for Endpoint Security

Absolute Computrace allows organizations to centrally track and secure all of
their endpoints within a single cloud-based console.
Computers and ultra-portable devices can be remotely managed and secured to
ensure – and most importantly prove – that endpoint IT compliance processes
are properly implemented and enforced.
Computrace provides
foundational support for all
activities related to Governance,
Risk Management, and
Compliance (GRC) for the
endpoint.
The Computrace Agent is automatically installed so that IT Administrators can track, manage, and
secure all devices regardless of user or location
Endpoint GRC Risk Factors
•

The endpoint represents a significant point of risk relative to GRC
– Non-Compliance
•
•
•
•

Software license agreements
Blacklisted programs
Government and vertically-specific regulatory bodies
End-of-life protocols

– Data Security
•
•
•
•
•

Unauthorized user access
Industrial espionage
Intellectual property
Encryption failure
Personally identifiable information

– Employee Misconduct
• Dishonest or criminal activities by employees
• Non-compliant behavior

•

Endpoint-specific GRC protocols can be implemented to mitigate the risk

6
GRC for the Endpoint
Computrace provides foundational support for all activities
related to GRC for the endpoint including:
•
•
•
•
•
•
•
•
•
•

Proactive alerts on predefined conditions
Data security & protection
Deployment & licensing audits
BYOD policy enforcement
Theft & criminal investigations
Security incident response & remediation
Computer forensics
Compliance reports & certificates
End-of-life protocols
12 months of device history

7
GRC for the Endpoint – How Computrace Fits
“What were the most common ways in which the breach(es) occurred in the past 12 months?”
34%

Loss/theft of corporate asset
Inadvertent misuse by insider

28%
22%

External attack targeting corporate servers or users
Abuse by malicious insider

13%

Loss/theft of business partner asset

7%

Inadvertent misuse by business partner

6%

Don’t know
External attack targeting business
partner’s servers or users
Abuse by malicious business partner
Other

5%
4%

80%

of data breach
scenarios can be
mitigated with
Computrace

3%
1%

Base: 508 North American and European IT security executives & technology decision makers whose firms had experienced a breach
in the past 12 months
Source: Forrsights Security Survey, Q2 2012

8
GRC for the Endpoint with Computrace
GRC provides an organization with the infrastructure to create rules, oversee
the application of the rules, provisioning of tools to take action to stay within the
rules, and finally the data to prove that they followed the rules and are indeed
compliant.
Governance = Infrastructure = Customer Center
Management of the process to monitor, direct, and control

Risk Management = Tools = Computrace Features
Management of the process to monitor, direct, and control

Compliance= Data = Computrace Data & Reports
Conform to internal and external regulations, must be provable
9
GRC Infrastructure: Customer Center
Governance = Infrastructure = Customer Center
Management of the process to monitor, direct, and control

•
•
•

Use Customer Center to identify activity or
device status deemed suspicious
Receive alerts if any of these conditions occur
for proactive response times
Computrace data flags potential
non-compliance:

10
GRC Tools: Computrace Features

Risk Management = Tools = Computrace Features
Management of the process to monitor, direct, and control
• Track software
licenses
• Receive alerts to be
notified about
suspicious behavior

• Remotely recover or
delete data from a device
• Freeze a device to block
access
• Remove all data from a
device at end-of-life
• Invoke Intel AT
technology to brick or
lock a device

• Track the location of a
device
• Use geofences to
monitor device
movement

• Investigate and recover
stolen devices
• Initiate an investigation to
determine why a security
incident occurred and
prevent it from happening
again

• Investigate suspicious
employee behavior
• Identify security holes
• Prevent incidents from
happening again
GRC Data: Computrace Device Data
Compliance= Data = Computrace Data & Reports
Conform to internal and external regulations, must be provable

•

Use Computrace data to prove compliance with corporate and
government regulations:
– Software license compliance report for contract negotiations and audits
– Encryption status report to show which devices were properly protected
with encryption
– End-of-Life data delete certificate
– Data delete audit log
– Proof if data was accessed post-incident

12
Regulatory Landscape
• Increasing corporate and government regulations
• Data breach notification laws commonplace
• IT security failures continue to increase exponentially

• FTC
• SOX
• GLBA

• FERPA
• Title 1
• EDGAR
Deconstructing a Data Breach – Healthcare

ID corporate/business entity responsible. Describe data breach with timeline. ID # of individuals affected. ID the
info stored on laptop. ID categories of info on laptop. ID forms of PHI/PI on laptop. Describe why data was stored
on laptop. Describe methods used to determine the contents of missing laptop. Was agreement in place with
vendor? Provide copy. Describe measures taken to safeguard PHI/PI. Describe all steps taken to locate missing
laptop and prevent access to data. Describe policies and procedures in place for compliance, privacy, and security
protection. Provide copies. Describe policies and procedures in place for associates. Provide copies. Provide copy
of investigative reports / audits related to the incident. Describe all steps taken to contact and warn affected
people. Describe details for response to HIPAA, HITECH and other regulations, etc.

Provide two years of credit monitoring services,
identity insurance, and credit report security freezes
for each affected individual at hospital’s expense

Repeat with all other
regulatory bodies.
Respond to patient &
media enquiries.

14
Deconstructing a Data Breach – Healthcare

Determine if this was a reportable incident and if
so, provide details to regulatory bodies.
GRC for the Endpoint – Large K12 School District

Uses Computrace and Absolute Manage to:
•
•
•

Track and enforce appropriate use in support of regulatory compliance
related to Title 1 equipment
Equipment is limited for use by certain staff and students in a specific
manner
Absolute allows them to locate devices regardless of user or location
(Computrace) and determine who / how the device is being used (Absolute
Manage)

16
GRC for the Endpoint – Global Enterprise Organization

Uses Computrace to:
•
•

•

Obtain detailed data from each device to know with certainty which
software licenses are in use
Provide an overview of the entire deployment (or specific groups) using the
Computrace software compliance report, including alerts if software license
quotas are exceeded
Avoid significant costs associated with collecting the same data manually
as experienced during BSA software audit

17
GRC for the Endpoint – Global Enterprise Organization

Uses Computrace to:
•
•
•
•

Collect data to identify and catch hard drive thieves
Perform forensic investigations on employees suspected of moonlighting
Investigate any suspicious users and collect more detailed data than typical
forensic tool set can provide
Understand how hardware theft occurred and adjust security accordingly

18
GRC for the Endpoint – Midsize Healthcare Organization

Uses Computrace to:
•
•
•

Monitor device status to ensure none are at risk
Determine source of risk and adjust as needed to ensure the event is not
repeated
Perform perpetual data delete commands to at-risk devices to remove all
healthcare data and render the device useless

19
GRC for the Endpoint – Large Enterprise Healthcare
Organization
Uses Computrace to:
•

Provide increased endpoint workstation security by supporting the following
functions:
– Disable a specific device to render it unusable and/or wipe data from a specific
device; to at least the latest publicized version of Department of Defense
standard wipe procedure
– Create a forensically sound defensible audit trail that records that the tool has
protected a specific device by disabling and/or removing data
– Certifies that the tool is tamper proof through attempted erasure and persistent
(ability to reinstall itself) when erasure is attempted

20
Absolute Computrace – Feature Categories
Asset Administration
Collect incredibly accurate and comprehensive information from each device.
Then create customized policies and alerts to be notified as soon as an
unauthorized change is detected.

Data & Device Security
Remotely delete sensitive data on missing computers including an audit log of
the deleted files to prove the data was removed from the device. Freeze a
device with a custom message to the user. Access and retrieve files regardless
of location.

Geotechnology
Track assets on an internet map including current and historical locations. Build
geofences to contain a device and receive an alert if it strays. If a device is not
where it should be, investigate and determine if further action is required.
Absolute Computrace – Feature Categories
Computer Forensics
The Absolute Investigations & Recovery team can forensically mine a stolen
computer over the internet using key captures, registry and file scanning,
geolocation, and other investigative techniques to determine who has the
computer and what they’re doing with it, including whether any data was
accessed post-theft.

Theft Recovery
At our customer’s request, the Absolute Investigations & Recovery team will
work closely with local police to recover a stolen device. We successfully
recover thousands of devices each year.
Customers

23

More Related Content

What's hot

It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
CAS
 
Using an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseUsing an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized Defense
EnclaveSecurity
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
Lisa Niles
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
Lisa Niles
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
Donald E. Hester
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
Lisa Niles
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
EnergySec
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
Lisa Niles
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
Lisa Niles
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
edwardstudyemai
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
Tripwire
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
EnclaveSecurity
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
EnclaveSecurity
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
Joseph Yosi Margalit
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
VISTA InfoSec
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
Jeffrey Wang , P.Eng
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
null The Open Security Community
 
Soc
SocSoc
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
ecarrow
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
genetics
 

What's hot (20)

It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Using an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseUsing an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized Defense
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
 
Soc
SocSoc
Soc
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 

Similar to Absolute grc-

PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
NCS Computech Ltd.
 
GACO Webinar: Practical Cybersecurity Compliance for Small Business Contractors
GACO Webinar: Practical Cybersecurity  Compliance for Small Business ContractorsGACO Webinar: Practical Cybersecurity  Compliance for Small Business Contractors
GACO Webinar: Practical Cybersecurity Compliance for Small Business Contractors
Robert E Jones
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
abe8512000
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviour
Kasper de Waard
 
Practical Cybersecurity Compliance for Small Business Contractors
Practical Cybersecurity Compliance for Small Business ContractorsPractical Cybersecurity Compliance for Small Business Contractors
Practical Cybersecurity Compliance for Small Business Contractors
Robert E Jones
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
Kaushal Trivedi
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
Kudzi Chikwatu
 
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdfNovatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
patemalabanan
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
Sergei Yavchenko
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
 
Effects of IT on internal controls
Effects of IT on internal controlsEffects of IT on internal controls
Effects of IT on internal controls
Lou Foja
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
phanleson
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
StevenTharp2
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
Great Bay Software
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
jpmccormack
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentation
Stefane Mouille
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
Mohammed Alabdali
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
Tony DeGonia (LION)
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
Adrian Dumitrescu
 

Similar to Absolute grc- (20)

PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
 
GACO Webinar: Practical Cybersecurity Compliance for Small Business Contractors
GACO Webinar: Practical Cybersecurity  Compliance for Small Business ContractorsGACO Webinar: Practical Cybersecurity  Compliance for Small Business Contractors
GACO Webinar: Practical Cybersecurity Compliance for Small Business Contractors
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviour
 
Practical Cybersecurity Compliance for Small Business Contractors
Practical Cybersecurity Compliance for Small Business ContractorsPractical Cybersecurity Compliance for Small Business Contractors
Practical Cybersecurity Compliance for Small Business Contractors
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdfNovatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Effects of IT on internal controls
Effects of IT on internal controlsEffects of IT on internal controls
Effects of IT on internal controls
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentation
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

Absolute grc-

  • 1. Absolute Software Governance Risk Compliance Sebastien Roques Senior Territory Account Executive France-Iberia & NWA| Absolute Software EMEA Ltd.
  • 2. About Absolute Software Nearly two decades securing and managing diverse endpoints
  • 3. Absolute Software: Track. Manage. Secure. Endpoint Security Centrally track and secure IT assets within a cloudbased console. Remotely manage and administer self-encrypting drives built into new computers. Endpoint Management Manage PC, Mac, Android, iOS and Windows Phone devices to take strategic and responsive action. IT Service Management Predict potential points of failure and make realtime decisions using ITIL certified best practices.
  • 4. Many Devices. One Solution. Two Magic Quadrants. 4
  • 5. Absolute Computrace for Endpoint Security Absolute Computrace allows organizations to centrally track and secure all of their endpoints within a single cloud-based console. Computers and ultra-portable devices can be remotely managed and secured to ensure – and most importantly prove – that endpoint IT compliance processes are properly implemented and enforced. Computrace provides foundational support for all activities related to Governance, Risk Management, and Compliance (GRC) for the endpoint. The Computrace Agent is automatically installed so that IT Administrators can track, manage, and secure all devices regardless of user or location
  • 6. Endpoint GRC Risk Factors • The endpoint represents a significant point of risk relative to GRC – Non-Compliance • • • • Software license agreements Blacklisted programs Government and vertically-specific regulatory bodies End-of-life protocols – Data Security • • • • • Unauthorized user access Industrial espionage Intellectual property Encryption failure Personally identifiable information – Employee Misconduct • Dishonest or criminal activities by employees • Non-compliant behavior • Endpoint-specific GRC protocols can be implemented to mitigate the risk 6
  • 7. GRC for the Endpoint Computrace provides foundational support for all activities related to GRC for the endpoint including: • • • • • • • • • • Proactive alerts on predefined conditions Data security & protection Deployment & licensing audits BYOD policy enforcement Theft & criminal investigations Security incident response & remediation Computer forensics Compliance reports & certificates End-of-life protocols 12 months of device history 7
  • 8. GRC for the Endpoint – How Computrace Fits “What were the most common ways in which the breach(es) occurred in the past 12 months?” 34% Loss/theft of corporate asset Inadvertent misuse by insider 28% 22% External attack targeting corporate servers or users Abuse by malicious insider 13% Loss/theft of business partner asset 7% Inadvertent misuse by business partner 6% Don’t know External attack targeting business partner’s servers or users Abuse by malicious business partner Other 5% 4% 80% of data breach scenarios can be mitigated with Computrace 3% 1% Base: 508 North American and European IT security executives & technology decision makers whose firms had experienced a breach in the past 12 months Source: Forrsights Security Survey, Q2 2012 8
  • 9. GRC for the Endpoint with Computrace GRC provides an organization with the infrastructure to create rules, oversee the application of the rules, provisioning of tools to take action to stay within the rules, and finally the data to prove that they followed the rules and are indeed compliant. Governance = Infrastructure = Customer Center Management of the process to monitor, direct, and control Risk Management = Tools = Computrace Features Management of the process to monitor, direct, and control Compliance= Data = Computrace Data & Reports Conform to internal and external regulations, must be provable 9
  • 10. GRC Infrastructure: Customer Center Governance = Infrastructure = Customer Center Management of the process to monitor, direct, and control • • • Use Customer Center to identify activity or device status deemed suspicious Receive alerts if any of these conditions occur for proactive response times Computrace data flags potential non-compliance: 10
  • 11. GRC Tools: Computrace Features Risk Management = Tools = Computrace Features Management of the process to monitor, direct, and control • Track software licenses • Receive alerts to be notified about suspicious behavior • Remotely recover or delete data from a device • Freeze a device to block access • Remove all data from a device at end-of-life • Invoke Intel AT technology to brick or lock a device • Track the location of a device • Use geofences to monitor device movement • Investigate and recover stolen devices • Initiate an investigation to determine why a security incident occurred and prevent it from happening again • Investigate suspicious employee behavior • Identify security holes • Prevent incidents from happening again
  • 12. GRC Data: Computrace Device Data Compliance= Data = Computrace Data & Reports Conform to internal and external regulations, must be provable • Use Computrace data to prove compliance with corporate and government regulations: – Software license compliance report for contract negotiations and audits – Encryption status report to show which devices were properly protected with encryption – End-of-Life data delete certificate – Data delete audit log – Proof if data was accessed post-incident 12
  • 13. Regulatory Landscape • Increasing corporate and government regulations • Data breach notification laws commonplace • IT security failures continue to increase exponentially • FTC • SOX • GLBA • FERPA • Title 1 • EDGAR
  • 14. Deconstructing a Data Breach – Healthcare ID corporate/business entity responsible. Describe data breach with timeline. ID # of individuals affected. ID the info stored on laptop. ID categories of info on laptop. ID forms of PHI/PI on laptop. Describe why data was stored on laptop. Describe methods used to determine the contents of missing laptop. Was agreement in place with vendor? Provide copy. Describe measures taken to safeguard PHI/PI. Describe all steps taken to locate missing laptop and prevent access to data. Describe policies and procedures in place for compliance, privacy, and security protection. Provide copies. Describe policies and procedures in place for associates. Provide copies. Provide copy of investigative reports / audits related to the incident. Describe all steps taken to contact and warn affected people. Describe details for response to HIPAA, HITECH and other regulations, etc. Provide two years of credit monitoring services, identity insurance, and credit report security freezes for each affected individual at hospital’s expense Repeat with all other regulatory bodies. Respond to patient & media enquiries. 14
  • 15. Deconstructing a Data Breach – Healthcare Determine if this was a reportable incident and if so, provide details to regulatory bodies.
  • 16. GRC for the Endpoint – Large K12 School District Uses Computrace and Absolute Manage to: • • • Track and enforce appropriate use in support of regulatory compliance related to Title 1 equipment Equipment is limited for use by certain staff and students in a specific manner Absolute allows them to locate devices regardless of user or location (Computrace) and determine who / how the device is being used (Absolute Manage) 16
  • 17. GRC for the Endpoint – Global Enterprise Organization Uses Computrace to: • • • Obtain detailed data from each device to know with certainty which software licenses are in use Provide an overview of the entire deployment (or specific groups) using the Computrace software compliance report, including alerts if software license quotas are exceeded Avoid significant costs associated with collecting the same data manually as experienced during BSA software audit 17
  • 18. GRC for the Endpoint – Global Enterprise Organization Uses Computrace to: • • • • Collect data to identify and catch hard drive thieves Perform forensic investigations on employees suspected of moonlighting Investigate any suspicious users and collect more detailed data than typical forensic tool set can provide Understand how hardware theft occurred and adjust security accordingly 18
  • 19. GRC for the Endpoint – Midsize Healthcare Organization Uses Computrace to: • • • Monitor device status to ensure none are at risk Determine source of risk and adjust as needed to ensure the event is not repeated Perform perpetual data delete commands to at-risk devices to remove all healthcare data and render the device useless 19
  • 20. GRC for the Endpoint – Large Enterprise Healthcare Organization Uses Computrace to: • Provide increased endpoint workstation security by supporting the following functions: – Disable a specific device to render it unusable and/or wipe data from a specific device; to at least the latest publicized version of Department of Defense standard wipe procedure – Create a forensically sound defensible audit trail that records that the tool has protected a specific device by disabling and/or removing data – Certifies that the tool is tamper proof through attempted erasure and persistent (ability to reinstall itself) when erasure is attempted 20
  • 21. Absolute Computrace – Feature Categories Asset Administration Collect incredibly accurate and comprehensive information from each device. Then create customized policies and alerts to be notified as soon as an unauthorized change is detected. Data & Device Security Remotely delete sensitive data on missing computers including an audit log of the deleted files to prove the data was removed from the device. Freeze a device with a custom message to the user. Access and retrieve files regardless of location. Geotechnology Track assets on an internet map including current and historical locations. Build geofences to contain a device and receive an alert if it strays. If a device is not where it should be, investigate and determine if further action is required.
  • 22. Absolute Computrace – Feature Categories Computer Forensics The Absolute Investigations & Recovery team can forensically mine a stolen computer over the internet using key captures, registry and file scanning, geolocation, and other investigative techniques to determine who has the computer and what they’re doing with it, including whether any data was accessed post-theft. Theft Recovery At our customer’s request, the Absolute Investigations & Recovery team will work closely with local police to recover a stolen device. We successfully recover thousands of devices each year.

Editor's Notes

  1. May 22 was our largest CAB to date – we have 14 customers attending – 3 are new this meeting. 77% of CAB customers have worked with marketing on PR, webinars, case studies, etc. Growing our customer reference program is an ongoing focus Next CAB meeting will be in Nov