Absolute Software the only provider of self-healing, intelligent security solutions, today announced that Forrester, an industry-leading analyst firm, has recognised Absolute in its recent report, The Zero Trust Platforms Landscape, Q2 2023. The publication advises readers on what Zero Trust platforms are, the business value they deliver, and on the dynamics and vendors driving the market.
The report also highlights how organisations can discover how to “use Zero Trust platforms to unite disparate security tools, apply effective security controls across hybrid business and operational models, and align essential functionalities to industry frameworks.”
As an included vendor, Absolute Software self-reported that clients select them for the use cases of “Extend and enhance visibility into enterprise assets” and “Enhance Segmentation across distributed enterprise.”
“Absolute is pleased to be recognised by Forrester for, in our opinion, delivering on the promise of Zero Trust with a unique platform approach that supports the enhanced segmentation and asset visibility capabilities required to enable ZTNA and continuous device posture assessment for today’s distributed enterprises,” said John Herrema, EVP of Product and Strategy at Absolute. “With the ability to establish and maintain resilient Zero Trust for every user that needs to access sensitive data and applications to stay productive and get their work done, Absolute’s customers can be certain that they are not only minimising risk and maximising security and compliance but also delivering the best possible user experience at all times.”
Also Read: Attack Surface Area Metrics that Every CISO Should Track
Anchored by our patented Persistence® technology embedded in more than 600 million devices globally distributed, Absolute’s Secure Endpoint and Secure Access product lines enable nearly 21,000 customers with unique and resilient Zero Trust security across their organisations. With Absolute, enterprises have an unbreakable, two-way connection to monitor mission-critical security applications’ health and behavior, including network access connections, identify if any are missing or corrupted, and automatically repair or reinstall components when necessary – without requiring human intervention.
Additionally, the report offers five core use cases Zero Trust platform providers fulfill: enable and protect the hybrid (anywhere) workforce, monitor and secure network traffic across the enterprise, prevent lateral movement of unauthorised activity, enforce least privilege on all entities, and centrally manage key security controls.
For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.