SlideShare a Scribd company logo
Absolute Software
Governance
Risk
Compliance

Sebastien Roques
Senior Territory Account Executive
France-Iberia & NWA| Absolute Software EMEA Ltd.
About Absolute Software

Nearly two decades securing and managing diverse endpoints
Absolute Software: Track. Manage. Secure.
Endpoint Security
Centrally track and secure IT assets within a cloudbased console.
Remotely manage and administer
self-encrypting drives built into new computers.

Endpoint Management
Manage PC, Mac, Android, iOS and Windows
Phone devices to take strategic and responsive
action.
IT Service Management
Predict potential points of failure and make realtime decisions using ITIL certified best practices.
Many Devices. One Solution. Two Magic Quadrants.

4
Absolute Computrace for Endpoint Security

Absolute Computrace allows organizations to centrally track and secure all of
their endpoints within a single cloud-based console.
Computers and ultra-portable devices can be remotely managed and secured to
ensure – and most importantly prove – that endpoint IT compliance processes
are properly implemented and enforced.
Computrace provides
foundational support for all
activities related to Governance,
Risk Management, and
Compliance (GRC) for the
endpoint.
The Computrace Agent is automatically installed so that IT Administrators can track, manage, and
secure all devices regardless of user or location
Endpoint GRC Risk Factors
•

The endpoint represents a significant point of risk relative to GRC
– Non-Compliance
•
•
•
•

Software license agreements
Blacklisted programs
Government and vertically-specific regulatory bodies
End-of-life protocols

– Data Security
•
•
•
•
•

Unauthorized user access
Industrial espionage
Intellectual property
Encryption failure
Personally identifiable information

– Employee Misconduct
• Dishonest or criminal activities by employees
• Non-compliant behavior

•

Endpoint-specific GRC protocols can be implemented to mitigate the risk

6
GRC for the Endpoint
Computrace provides foundational support for all activities
related to GRC for the endpoint including:
•
•
•
•
•
•
•
•
•
•

Proactive alerts on predefined conditions
Data security & protection
Deployment & licensing audits
BYOD policy enforcement
Theft & criminal investigations
Security incident response & remediation
Computer forensics
Compliance reports & certificates
End-of-life protocols
12 months of device history

7
GRC for the Endpoint – How Computrace Fits
“What were the most common ways in which the breach(es) occurred in the past 12 months?”
34%

Loss/theft of corporate asset
Inadvertent misuse by insider

28%
22%

External attack targeting corporate servers or users
Abuse by malicious insider

13%

Loss/theft of business partner asset

7%

Inadvertent misuse by business partner

6%

Don’t know
External attack targeting business
partner’s servers or users
Abuse by malicious business partner
Other

5%
4%

80%

of data breach
scenarios can be
mitigated with
Computrace

3%
1%

Base: 508 North American and European IT security executives & technology decision makers whose firms had experienced a breach
in the past 12 months
Source: Forrsights Security Survey, Q2 2012

8
GRC for the Endpoint with Computrace
GRC provides an organization with the infrastructure to create rules, oversee
the application of the rules, provisioning of tools to take action to stay within the
rules, and finally the data to prove that they followed the rules and are indeed
compliant.
Governance = Infrastructure = Customer Center
Management of the process to monitor, direct, and control

Risk Management = Tools = Computrace Features
Management of the process to monitor, direct, and control

Compliance= Data = Computrace Data & Reports
Conform to internal and external regulations, must be provable
9
GRC Infrastructure: Customer Center
Governance = Infrastructure = Customer Center
Management of the process to monitor, direct, and control

•
•
•

Use Customer Center to identify activity or
device status deemed suspicious
Receive alerts if any of these conditions occur
for proactive response times
Computrace data flags potential
non-compliance:

10
GRC Tools: Computrace Features

Risk Management = Tools = Computrace Features
Management of the process to monitor, direct, and control
• Track software
licenses
• Receive alerts to be
notified about
suspicious behavior

• Remotely recover or
delete data from a device
• Freeze a device to block
access
• Remove all data from a
device at end-of-life
• Invoke Intel AT
technology to brick or
lock a device

• Track the location of a
device
• Use geofences to
monitor device
movement

• Investigate and recover
stolen devices
• Initiate an investigation to
determine why a security
incident occurred and
prevent it from happening
again

• Investigate suspicious
employee behavior
• Identify security holes
• Prevent incidents from
happening again
GRC Data: Computrace Device Data
Compliance= Data = Computrace Data & Reports
Conform to internal and external regulations, must be provable

•

Use Computrace data to prove compliance with corporate and
government regulations:
– Software license compliance report for contract negotiations and audits
– Encryption status report to show which devices were properly protected
with encryption
– End-of-Life data delete certificate
– Data delete audit log
– Proof if data was accessed post-incident

12
Regulatory Landscape
• Increasing corporate and government regulations
• Data breach notification laws commonplace
• IT security failures continue to increase exponentially

• FTC
• SOX
• GLBA

• FERPA
• Title 1
• EDGAR
Deconstructing a Data Breach – Healthcare

ID corporate/business entity responsible. Describe data breach with timeline. ID # of individuals affected. ID the
info stored on laptop. ID categories of info on laptop. ID forms of PHI/PI on laptop. Describe why data was stored
on laptop. Describe methods used to determine the contents of missing laptop. Was agreement in place with
vendor? Provide copy. Describe measures taken to safeguard PHI/PI. Describe all steps taken to locate missing
laptop and prevent access to data. Describe policies and procedures in place for compliance, privacy, and security
protection. Provide copies. Describe policies and procedures in place for associates. Provide copies. Provide copy
of investigative reports / audits related to the incident. Describe all steps taken to contact and warn affected
people. Describe details for response to HIPAA, HITECH and other regulations, etc.

Provide two years of credit monitoring services,
identity insurance, and credit report security freezes
for each affected individual at hospital’s expense

Repeat with all other
regulatory bodies.
Respond to patient &
media enquiries.

14
Deconstructing a Data Breach – Healthcare

Determine if this was a reportable incident and if
so, provide details to regulatory bodies.
GRC for the Endpoint – Large K12 School District

Uses Computrace and Absolute Manage to:
•
•
•

Track and enforce appropriate use in support of regulatory compliance
related to Title 1 equipment
Equipment is limited for use by certain staff and students in a specific
manner
Absolute allows them to locate devices regardless of user or location
(Computrace) and determine who / how the device is being used (Absolute
Manage)

16
GRC for the Endpoint – Global Enterprise Organization

Uses Computrace to:
•
•

•

Obtain detailed data from each device to know with certainty which
software licenses are in use
Provide an overview of the entire deployment (or specific groups) using the
Computrace software compliance report, including alerts if software license
quotas are exceeded
Avoid significant costs associated with collecting the same data manually
as experienced during BSA software audit

17
GRC for the Endpoint – Global Enterprise Organization

Uses Computrace to:
•
•
•
•

Collect data to identify and catch hard drive thieves
Perform forensic investigations on employees suspected of moonlighting
Investigate any suspicious users and collect more detailed data than typical
forensic tool set can provide
Understand how hardware theft occurred and adjust security accordingly

18
GRC for the Endpoint – Midsize Healthcare Organization

Uses Computrace to:
•
•
•

Monitor device status to ensure none are at risk
Determine source of risk and adjust as needed to ensure the event is not
repeated
Perform perpetual data delete commands to at-risk devices to remove all
healthcare data and render the device useless

19
GRC for the Endpoint – Large Enterprise Healthcare
Organization
Uses Computrace to:
•

Provide increased endpoint workstation security by supporting the following
functions:
– Disable a specific device to render it unusable and/or wipe data from a specific
device; to at least the latest publicized version of Department of Defense
standard wipe procedure
– Create a forensically sound defensible audit trail that records that the tool has
protected a specific device by disabling and/or removing data
– Certifies that the tool is tamper proof through attempted erasure and persistent
(ability to reinstall itself) when erasure is attempted

20
Absolute Computrace – Feature Categories
Asset Administration
Collect incredibly accurate and comprehensive information from each device.
Then create customized policies and alerts to be notified as soon as an
unauthorized change is detected.

Data & Device Security
Remotely delete sensitive data on missing computers including an audit log of
the deleted files to prove the data was removed from the device. Freeze a
device with a custom message to the user. Access and retrieve files regardless
of location.

Geotechnology
Track assets on an internet map including current and historical locations. Build
geofences to contain a device and receive an alert if it strays. If a device is not
where it should be, investigate and determine if further action is required.
Absolute Computrace – Feature Categories
Computer Forensics
The Absolute Investigations & Recovery team can forensically mine a stolen
computer over the internet using key captures, registry and file scanning,
geolocation, and other investigative techniques to determine who has the
computer and what they’re doing with it, including whether any data was
accessed post-theft.

Theft Recovery
At our customer’s request, the Absolute Investigations & Recovery team will
work closely with local police to recover a stolen device. We successfully
recover thousands of devices each year.
Customers

23

More Related Content

What's hot

It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
CAS
 
Using an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseUsing an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized Defense
EnclaveSecurity
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
Lisa Niles
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
Lisa Niles
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
Donald E. Hester
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
Lisa Niles
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
EnergySec
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
Lisa Niles
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
Lisa Niles
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
edwardstudyemai
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
Tripwire
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
EnclaveSecurity
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
EnclaveSecurity
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
Joseph Yosi Margalit
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
VISTA InfoSec
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
Jeffrey Wang , P.Eng
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
null The Open Security Community
 
Soc
SocSoc
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
ecarrow
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
genetics
 

What's hot (20)

It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Using an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseUsing an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized Defense
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
 
Soc
SocSoc
Soc
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 

Viewers also liked

mHealth Israel_President Trump and the Future of US Healthcare Regulation and...
mHealth Israel_President Trump and the Future of US Healthcare Regulation and...mHealth Israel_President Trump and the Future of US Healthcare Regulation and...
mHealth Israel_President Trump and the Future of US Healthcare Regulation and...
Levi Shapiro
 
Healthcare IT- A comparison between US and Indian Healthcare
Healthcare IT- A comparison between US and Indian HealthcareHealthcare IT- A comparison between US and Indian Healthcare
Healthcare IT- A comparison between US and Indian Healthcare
kunalsawant
 
Healthcare reform post 2016 election platform summary 11 12_2016
Healthcare reform post 2016 election platform summary 11 12_2016Healthcare reform post 2016 election platform summary 11 12_2016
Healthcare reform post 2016 election platform summary 11 12_2016
Mark C. Smith
 
Healthcare Nous InfoSystem
Healthcare Nous InfoSystemHealthcare Nous InfoSystem
Healthcare Nous InfoSystem
Ujjwal Anand
 
Obama care a new opportunity in us healthcare - finpro
Obama care   a new opportunity in us healthcare - finproObama care   a new opportunity in us healthcare - finpro
Obama care a new opportunity in us healthcare - finpro
Business Finland
 
The Healthcare Digital Marketing Landscape
The Healthcare Digital Marketing LandscapeThe Healthcare Digital Marketing Landscape
The Healthcare Digital Marketing Landscape
praemedica digital
 
FulcrumWay GRC Solutions
FulcrumWay GRC SolutionsFulcrumWay GRC Solutions
FulcrumWay GRC Solutions
Mantala
 
Driving Real Change In US Healthcare - Webinar slides
Driving Real Change In US Healthcare - Webinar slidesDriving Real Change In US Healthcare - Webinar slides
Driving Real Change In US Healthcare - Webinar slides
Belatrix Software
 
ACA After The Election: What Now?
ACA After The Election: What Now?ACA After The Election: What Now?
ACA After The Election: What Now?
Jhane Wilcox, MBA
 
Ambulatory Care in the US Healthcare System, Portfolio Option #1
Ambulatory Care in the US Healthcare System, Portfolio Option #1Ambulatory Care in the US Healthcare System, Portfolio Option #1
Ambulatory Care in the US Healthcare System, Portfolio Option #1
Ricci Hayes
 
Healthcare: Improving patient outcomes
Healthcare: Improving patient outcomesHealthcare: Improving patient outcomes
Healthcare: Improving patient outcomes
Canon for Business UK
 
Laboratory Products Association
Laboratory Products AssociationLaboratory Products Association
Laboratory Products Association
www.andrewbusch.com
 
Customer Presentation with a Healthcare Company
Customer Presentation with a Healthcare CompanyCustomer Presentation with a Healthcare Company
Customer Presentation with a Healthcare Company
Splunk
 
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsEnterprise Security and User Behavior Analytics
Enterprise Security and User Behavior Analytics
Splunk
 
The 3 Key Barriers Keeping Companies from Deploying Data Products
The 3 Key Barriers Keeping Companies from Deploying Data Products The 3 Key Barriers Keeping Companies from Deploying Data Products
The 3 Key Barriers Keeping Companies from Deploying Data Products
Dataiku
 
The US Healthcare Industry
The US Healthcare IndustryThe US Healthcare Industry
The US Healthcare Industry
Dataiku
 
Us Health System Ppt
Us Health System PptUs Health System Ppt
Us Health System Ppt
asadhu86
 
Structure of us healthcare
Structure of us healthcareStructure of us healthcare
Structure of us healthcare
Philip Corsano
 
The US Healthcare System by Madhav Sitaraman
The US Healthcare System by Madhav SitaramanThe US Healthcare System by Madhav Sitaraman
The US Healthcare System by Madhav Sitaraman
The Hive
 
Us Healthcare Presentation
Us Healthcare PresentationUs Healthcare Presentation
Us Healthcare Presentation
esilbert
 

Viewers also liked (20)

mHealth Israel_President Trump and the Future of US Healthcare Regulation and...
mHealth Israel_President Trump and the Future of US Healthcare Regulation and...mHealth Israel_President Trump and the Future of US Healthcare Regulation and...
mHealth Israel_President Trump and the Future of US Healthcare Regulation and...
 
Healthcare IT- A comparison between US and Indian Healthcare
Healthcare IT- A comparison between US and Indian HealthcareHealthcare IT- A comparison between US and Indian Healthcare
Healthcare IT- A comparison between US and Indian Healthcare
 
Healthcare reform post 2016 election platform summary 11 12_2016
Healthcare reform post 2016 election platform summary 11 12_2016Healthcare reform post 2016 election platform summary 11 12_2016
Healthcare reform post 2016 election platform summary 11 12_2016
 
Healthcare Nous InfoSystem
Healthcare Nous InfoSystemHealthcare Nous InfoSystem
Healthcare Nous InfoSystem
 
Obama care a new opportunity in us healthcare - finpro
Obama care   a new opportunity in us healthcare - finproObama care   a new opportunity in us healthcare - finpro
Obama care a new opportunity in us healthcare - finpro
 
The Healthcare Digital Marketing Landscape
The Healthcare Digital Marketing LandscapeThe Healthcare Digital Marketing Landscape
The Healthcare Digital Marketing Landscape
 
FulcrumWay GRC Solutions
FulcrumWay GRC SolutionsFulcrumWay GRC Solutions
FulcrumWay GRC Solutions
 
Driving Real Change In US Healthcare - Webinar slides
Driving Real Change In US Healthcare - Webinar slidesDriving Real Change In US Healthcare - Webinar slides
Driving Real Change In US Healthcare - Webinar slides
 
ACA After The Election: What Now?
ACA After The Election: What Now?ACA After The Election: What Now?
ACA After The Election: What Now?
 
Ambulatory Care in the US Healthcare System, Portfolio Option #1
Ambulatory Care in the US Healthcare System, Portfolio Option #1Ambulatory Care in the US Healthcare System, Portfolio Option #1
Ambulatory Care in the US Healthcare System, Portfolio Option #1
 
Healthcare: Improving patient outcomes
Healthcare: Improving patient outcomesHealthcare: Improving patient outcomes
Healthcare: Improving patient outcomes
 
Laboratory Products Association
Laboratory Products AssociationLaboratory Products Association
Laboratory Products Association
 
Customer Presentation with a Healthcare Company
Customer Presentation with a Healthcare CompanyCustomer Presentation with a Healthcare Company
Customer Presentation with a Healthcare Company
 
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsEnterprise Security and User Behavior Analytics
Enterprise Security and User Behavior Analytics
 
The 3 Key Barriers Keeping Companies from Deploying Data Products
The 3 Key Barriers Keeping Companies from Deploying Data Products The 3 Key Barriers Keeping Companies from Deploying Data Products
The 3 Key Barriers Keeping Companies from Deploying Data Products
 
The US Healthcare Industry
The US Healthcare IndustryThe US Healthcare Industry
The US Healthcare Industry
 
Us Health System Ppt
Us Health System PptUs Health System Ppt
Us Health System Ppt
 
Structure of us healthcare
Structure of us healthcareStructure of us healthcare
Structure of us healthcare
 
The US Healthcare System by Madhav Sitaraman
The US Healthcare System by Madhav SitaramanThe US Healthcare System by Madhav Sitaraman
The US Healthcare System by Madhav Sitaraman
 
Us Healthcare Presentation
Us Healthcare PresentationUs Healthcare Presentation
Us Healthcare Presentation
 

Similar to Absolute Software Governance-Risk-Compliance

PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
NCS Computech Ltd.
 
GACO Webinar: Practical Cybersecurity Compliance for Small Business Contractors
GACO Webinar: Practical Cybersecurity  Compliance for Small Business ContractorsGACO Webinar: Practical Cybersecurity  Compliance for Small Business Contractors
GACO Webinar: Practical Cybersecurity Compliance for Small Business Contractors
Robert E Jones
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
abe8512000
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviour
Kasper de Waard
 
Practical Cybersecurity Compliance for Small Business Contractors
Practical Cybersecurity Compliance for Small Business ContractorsPractical Cybersecurity Compliance for Small Business Contractors
Practical Cybersecurity Compliance for Small Business Contractors
Robert E Jones
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
Kaushal Trivedi
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
Kudzi Chikwatu
 
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdfNovatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
patemalabanan
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
Sergei Yavchenko
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
 
Effects of IT on internal controls
Effects of IT on internal controlsEffects of IT on internal controls
Effects of IT on internal controls
Lou Foja
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
phanleson
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
StevenTharp2
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
Great Bay Software
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
jpmccormack
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentation
Stefane Mouille
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
Mohammed Alabdali
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
Tony DeGonia (LION)
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
Adrian Dumitrescu
 

Similar to Absolute Software Governance-Risk-Compliance (20)

PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
 
GACO Webinar: Practical Cybersecurity Compliance for Small Business Contractors
GACO Webinar: Practical Cybersecurity  Compliance for Small Business ContractorsGACO Webinar: Practical Cybersecurity  Compliance for Small Business Contractors
GACO Webinar: Practical Cybersecurity Compliance for Small Business Contractors
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviour
 
Practical Cybersecurity Compliance for Small Business Contractors
Practical Cybersecurity Compliance for Small Business ContractorsPractical Cybersecurity Compliance for Small Business Contractors
Practical Cybersecurity Compliance for Small Business Contractors
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdfNovatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Effects of IT on internal controls
Effects of IT on internal controlsEffects of IT on internal controls
Effects of IT on internal controls
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentation
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 

Recently uploaded

How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
Aleksey Savkin
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
CLIVE MINCHIN
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
thesiliconleaders
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
SabaaSudozai
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
sssourabhsharma
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
Chandresh Chudasama
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
Lacey Max
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 

Recently uploaded (20)

How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 

Absolute Software Governance-Risk-Compliance

  • 1. Absolute Software Governance Risk Compliance Sebastien Roques Senior Territory Account Executive France-Iberia & NWA| Absolute Software EMEA Ltd.
  • 2. About Absolute Software Nearly two decades securing and managing diverse endpoints
  • 3. Absolute Software: Track. Manage. Secure. Endpoint Security Centrally track and secure IT assets within a cloudbased console. Remotely manage and administer self-encrypting drives built into new computers. Endpoint Management Manage PC, Mac, Android, iOS and Windows Phone devices to take strategic and responsive action. IT Service Management Predict potential points of failure and make realtime decisions using ITIL certified best practices.
  • 4. Many Devices. One Solution. Two Magic Quadrants. 4
  • 5. Absolute Computrace for Endpoint Security Absolute Computrace allows organizations to centrally track and secure all of their endpoints within a single cloud-based console. Computers and ultra-portable devices can be remotely managed and secured to ensure – and most importantly prove – that endpoint IT compliance processes are properly implemented and enforced. Computrace provides foundational support for all activities related to Governance, Risk Management, and Compliance (GRC) for the endpoint. The Computrace Agent is automatically installed so that IT Administrators can track, manage, and secure all devices regardless of user or location
  • 6. Endpoint GRC Risk Factors • The endpoint represents a significant point of risk relative to GRC – Non-Compliance • • • • Software license agreements Blacklisted programs Government and vertically-specific regulatory bodies End-of-life protocols – Data Security • • • • • Unauthorized user access Industrial espionage Intellectual property Encryption failure Personally identifiable information – Employee Misconduct • Dishonest or criminal activities by employees • Non-compliant behavior • Endpoint-specific GRC protocols can be implemented to mitigate the risk 6
  • 7. GRC for the Endpoint Computrace provides foundational support for all activities related to GRC for the endpoint including: • • • • • • • • • • Proactive alerts on predefined conditions Data security & protection Deployment & licensing audits BYOD policy enforcement Theft & criminal investigations Security incident response & remediation Computer forensics Compliance reports & certificates End-of-life protocols 12 months of device history 7
  • 8. GRC for the Endpoint – How Computrace Fits “What were the most common ways in which the breach(es) occurred in the past 12 months?” 34% Loss/theft of corporate asset Inadvertent misuse by insider 28% 22% External attack targeting corporate servers or users Abuse by malicious insider 13% Loss/theft of business partner asset 7% Inadvertent misuse by business partner 6% Don’t know External attack targeting business partner’s servers or users Abuse by malicious business partner Other 5% 4% 80% of data breach scenarios can be mitigated with Computrace 3% 1% Base: 508 North American and European IT security executives & technology decision makers whose firms had experienced a breach in the past 12 months Source: Forrsights Security Survey, Q2 2012 8
  • 9. GRC for the Endpoint with Computrace GRC provides an organization with the infrastructure to create rules, oversee the application of the rules, provisioning of tools to take action to stay within the rules, and finally the data to prove that they followed the rules and are indeed compliant. Governance = Infrastructure = Customer Center Management of the process to monitor, direct, and control Risk Management = Tools = Computrace Features Management of the process to monitor, direct, and control Compliance= Data = Computrace Data & Reports Conform to internal and external regulations, must be provable 9
  • 10. GRC Infrastructure: Customer Center Governance = Infrastructure = Customer Center Management of the process to monitor, direct, and control • • • Use Customer Center to identify activity or device status deemed suspicious Receive alerts if any of these conditions occur for proactive response times Computrace data flags potential non-compliance: 10
  • 11. GRC Tools: Computrace Features Risk Management = Tools = Computrace Features Management of the process to monitor, direct, and control • Track software licenses • Receive alerts to be notified about suspicious behavior • Remotely recover or delete data from a device • Freeze a device to block access • Remove all data from a device at end-of-life • Invoke Intel AT technology to brick or lock a device • Track the location of a device • Use geofences to monitor device movement • Investigate and recover stolen devices • Initiate an investigation to determine why a security incident occurred and prevent it from happening again • Investigate suspicious employee behavior • Identify security holes • Prevent incidents from happening again
  • 12. GRC Data: Computrace Device Data Compliance= Data = Computrace Data & Reports Conform to internal and external regulations, must be provable • Use Computrace data to prove compliance with corporate and government regulations: – Software license compliance report for contract negotiations and audits – Encryption status report to show which devices were properly protected with encryption – End-of-Life data delete certificate – Data delete audit log – Proof if data was accessed post-incident 12
  • 13. Regulatory Landscape • Increasing corporate and government regulations • Data breach notification laws commonplace • IT security failures continue to increase exponentially • FTC • SOX • GLBA • FERPA • Title 1 • EDGAR
  • 14. Deconstructing a Data Breach – Healthcare ID corporate/business entity responsible. Describe data breach with timeline. ID # of individuals affected. ID the info stored on laptop. ID categories of info on laptop. ID forms of PHI/PI on laptop. Describe why data was stored on laptop. Describe methods used to determine the contents of missing laptop. Was agreement in place with vendor? Provide copy. Describe measures taken to safeguard PHI/PI. Describe all steps taken to locate missing laptop and prevent access to data. Describe policies and procedures in place for compliance, privacy, and security protection. Provide copies. Describe policies and procedures in place for associates. Provide copies. Provide copy of investigative reports / audits related to the incident. Describe all steps taken to contact and warn affected people. Describe details for response to HIPAA, HITECH and other regulations, etc. Provide two years of credit monitoring services, identity insurance, and credit report security freezes for each affected individual at hospital’s expense Repeat with all other regulatory bodies. Respond to patient & media enquiries. 14
  • 15. Deconstructing a Data Breach – Healthcare Determine if this was a reportable incident and if so, provide details to regulatory bodies.
  • 16. GRC for the Endpoint – Large K12 School District Uses Computrace and Absolute Manage to: • • • Track and enforce appropriate use in support of regulatory compliance related to Title 1 equipment Equipment is limited for use by certain staff and students in a specific manner Absolute allows them to locate devices regardless of user or location (Computrace) and determine who / how the device is being used (Absolute Manage) 16
  • 17. GRC for the Endpoint – Global Enterprise Organization Uses Computrace to: • • • Obtain detailed data from each device to know with certainty which software licenses are in use Provide an overview of the entire deployment (or specific groups) using the Computrace software compliance report, including alerts if software license quotas are exceeded Avoid significant costs associated with collecting the same data manually as experienced during BSA software audit 17
  • 18. GRC for the Endpoint – Global Enterprise Organization Uses Computrace to: • • • • Collect data to identify and catch hard drive thieves Perform forensic investigations on employees suspected of moonlighting Investigate any suspicious users and collect more detailed data than typical forensic tool set can provide Understand how hardware theft occurred and adjust security accordingly 18
  • 19. GRC for the Endpoint – Midsize Healthcare Organization Uses Computrace to: • • • Monitor device status to ensure none are at risk Determine source of risk and adjust as needed to ensure the event is not repeated Perform perpetual data delete commands to at-risk devices to remove all healthcare data and render the device useless 19
  • 20. GRC for the Endpoint – Large Enterprise Healthcare Organization Uses Computrace to: • Provide increased endpoint workstation security by supporting the following functions: – Disable a specific device to render it unusable and/or wipe data from a specific device; to at least the latest publicized version of Department of Defense standard wipe procedure – Create a forensically sound defensible audit trail that records that the tool has protected a specific device by disabling and/or removing data – Certifies that the tool is tamper proof through attempted erasure and persistent (ability to reinstall itself) when erasure is attempted 20
  • 21. Absolute Computrace – Feature Categories Asset Administration Collect incredibly accurate and comprehensive information from each device. Then create customized policies and alerts to be notified as soon as an unauthorized change is detected. Data & Device Security Remotely delete sensitive data on missing computers including an audit log of the deleted files to prove the data was removed from the device. Freeze a device with a custom message to the user. Access and retrieve files regardless of location. Geotechnology Track assets on an internet map including current and historical locations. Build geofences to contain a device and receive an alert if it strays. If a device is not where it should be, investigate and determine if further action is required.
  • 22. Absolute Computrace – Feature Categories Computer Forensics The Absolute Investigations & Recovery team can forensically mine a stolen computer over the internet using key captures, registry and file scanning, geolocation, and other investigative techniques to determine who has the computer and what they’re doing with it, including whether any data was accessed post-theft. Theft Recovery At our customer’s request, the Absolute Investigations & Recovery team will work closely with local police to recover a stolen device. We successfully recover thousands of devices each year.

Editor's Notes

  1. May 22 was our largest CAB to date – we have 14 customers attending – 3 are new this meeting. 77% of CAB customers have worked with marketing on PR, webinars, case studies, etc. Growing our customer reference program is an ongoing focus Next CAB meeting will be in Nov