The integration of Absolute with Microsoft AIP allows organisations to identify and locate sensitive data, which can reside in a number of popular application and file types including Word, Excel, PowerPoint and PDF.
Once seamlessly applied through the Absolute console, the AIP protection remains attached to the files even if they move off the endpoint, allowing only authorised users to access the files. This approach to data protection balances security with flexibility by shifting data protection from being device-centric to user-centric. Customers now have unparalleled visibility into endpoints to better manage unwanted access to these sensitive files, without potentially restrictive policies hampering productivity or security workarounds causing potential data breaches.
The two solutions provide strong complementary data protection that:
•Gives visibility into what sensitive data is currently on any device and where it resides.
•Protects at-risk data even if it leaves the endpoint.
•Ensures only authorised users can access sensitive files, without blocking the end-users, enabling them to be more efficient while securing sensitive data.
“Security professionals are tasked with protecting data, which becomes mission-critical when a highly distributed workforce is accessing sensitive data from outside the company walls,” said Eric Aarrestad, EVP, product management, Absolute. “IT directors need security solutions that are intelligent enough to protect their most sensitive information without hindering their workforce’s productivity, especially when files are removed from company devices and shared in the cloud or on a flash drive.”
“Microsoft and Absolute share a common goal to protect the sensitive data in an organisation, and integrating Absolute with AIP brings a new level of visibility, protection and value for our customers,” said Gagan Gulati, Principal Group Product Manager, Microsoft Azure Information Protection. “Together, Microsoft AIP and Absolute can provide visibility into dark endpoints, configure rules to detect sensitive data, and provide persistent protection that travels with your data and keeps it safe.”