Absolute Software

This Is I.T. - 09.06.12

Absolute provides endpoint visibility and control to help self-healing endpoint security and always-connected IT asset management to protect devices, data, applications, and users — on and off the corporate network.

Bridging the gap between security and IT operations, only Absolute gives enterprises visibility they can act on to protect every endpoint, remediate vulnerabilities, and ensure compliance in the face of insider and external threats. Absolute’s patented Persistence technology is already embedded in the firmware of PC and mobile devices and trusted by over 12,000 customers worldwide.


Company Mission ("Tagline"): Single Source of Truth for Enterprise Resilience

Industry Classification: Computer & Network Security

Cybersecurity Specializations: Endpoint Security, Endpoint Visibility, Self-healing Endpoint, Data Risk Management, IT Asset Management, Enterprise Resiliency, Persistence, and cybersecurity

Address/Location: Vancouver, British Columbia
This oganization might be multinational; we list their HQ.

Company Size: 201-500 employees

Year of Incorporation: 1993

Main Website: Absolute Software

Discovered Absolute Software Social Media Accounts

LinkedIn Twitter YouTube

Hacker Hotshot Speaker: Guy Helmer

Date of Recording: September 7th, 2012

About Guy Helmer:

Technical leadership of architecture, requirements, feature and functional design, implementation details, and troubleshooting for cross-platform network activity monitoring and data-loss-prevention in the Absolute SaaS platform. Expertise in Windows and Mac kernel drivers, networking stacks, and filesystems; network traffic analysis; text analysis; Java and Python web services deployed using Docker containers in Kubernetes; SQL and MongoDB databases. Advocacy in adopting and implementing agile methodologies.

Occasional advisor on technology analysis / due diligence and venture capital funding / startup company funding.

Undergraduate and graduate teaching experience including Enterprise Cybersecurity Management, Advanced Business Programming using Python for data analysis and Git collaboration tools, Network Management and Network Security (oriented to business), Intermediate Business Programming (emphasizing Java), and Advanced Telecommunications & Networks (emphasizing cloud computing), Distributed systems theory, and Java network programming.

Longtime open-source advocate and community participant in projects including FreeBSD, Squid, MinGW, and (in the distant past) TeX and LaTeX.

Ph.D. research leveraging agent technologies, machine learning, and fault-tree analysis of attacks in distributed intrusion detection systems, and high-performance computing using clusters of commodity computers using bleeding-edge networks at Ames Laboratory.

Past experience in network engineering, system programming, administration, and security of campus-wide LAN and WAN networks.