Absolute DDS for Healthcare is an expanded offering of the company's core security solution, developed to fulfill the high levels of endpoint security, forensic support, and regulatory response for healthcare companies. Absolute DDS for Healthcare entitles access to Healthcare Endpoint Investigations delivered by certified Healthcare Information Security and Privacy Practitioners (HCISPP) and Certified Protection Professionals (CPP).
Absolute Data & Device Security for Healthcare Premium - For Hfirst - subscription license (1 year) - 1 device - Win, Mac, Android
- Security applications - security management, confidential data control
- Subscription license - 1 year
- Risk assessment
Identify risk conditions and receive a notification if these conditions occur. Key security data integrates automatically with SIEM solutions. Validate the status of complementary security applications such as encryption, anti-malware, and SCCM. Use these reports to prove to auditors that security measures were properly implemented and in place at the time of a security incident.
- Risk response
Remotely recover or delete data. Set policies to ensure offline devices are automatically protected. Freeze a device and communicate with the user to verify status. Produce an audit log to prove data on a compromised device was properly secured, not accessed, and safely deleted. Use certified data delete workflows to decommission a device.
- Endpoint investigations
Leverage the Absolute Investigations team to determine the cause of an endpoint security incident. Identify and eliminate insider threats. Refine best practices so the same incident does not reoccur. Determine if data was accessed during an incident, and whether or not a data breach notification is required. Recover stolen devices.
- Reporting and analytics
Collect incredibly accurate information from each device, including historical data. Determine what's installed on a device. Identify events and activities that could be precursors to a security incident including changes to IP address, location, and user; non-compliant software/ hardware installations; and many more. Receive a notification if these activities occur.
Track assets on a Google Map, including recent and historical locations. Create geofences based on corporate policies. Investigate devices that are out of bounds or entering an unauthorized location.