0001071058-22-000018.txt : 20220415 0001071058-22-000018.hdr.sgml : 20220415 20220414203554 ACCESSION NUMBER: 0001071058-22-000018 CONFORMED SUBMISSION TYPE: 6-K PUBLIC DOCUMENT COUNT: 3 CONFORMED PERIOD OF REPORT: 20220414 FILED AS OF DATE: 20220415 DATE AS OF CHANGE: 20220414 FILER: COMPANY DATA: COMPANY CONFORMED NAME: ABSOLUTE SOFTWARE CORP CENTRAL INDEX KEY: 0001071058 STANDARD INDUSTRIAL CLASSIFICATION: SERVICES-PREPACKAGED SOFTWARE [7372] IRS NUMBER: 000000000 STATE OF INCORPORATION: A1 FILING VALUES: FORM TYPE: 6-K SEC ACT: 1934 Act SEC FILE NUMBER: 001-39663 FILM NUMBER: 22828767 BUSINESS ADDRESS: STREET 1: 1055 DUNSMUIR STREET CITY: VANCOUVER STATE: A1 ZIP: 00000 BUSINESS PHONE: (604) 730-9851 MAIL ADDRESS: STREET 1: 1055 DUNSMUIR STREET CITY: VANCOUVER STATE: A1 ZIP: 00000 6-K 1 a6-kapril14x22ransomwarere.htm 6-K Document

UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, D.C. 20549
_____________________
Form 6-K
_____________________
REPORT OF FOREIGN PRIVATE ISSUER
PURSUANT TO RULE 13a-16 OR 15d-16
UNDER THE SECURITIES EXCHANGE ACT OF 1934
For the month of April 2022
Commission File Number 001-39663
_____________________
ABSOLUTE SOFTWARE CORPORATION
(Exact name of Registrant, as specified in its charter)
_____________________

N/A
(Translation of registrant’s name)
_____________________

Suite 1400
Four Bentall Centre, 1055 Dunsmuir Street
Vancouver, British Columbia
V7X 1K8 Canada
(604) 730-9851
(Address and telephone number of registrant’s principal executive offices)
_____________________
Indicate by check mark whether the registrant files or will file annual reports under cover of Form 20-F or Form 40-F. Form 20-F o Form 40-F
Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(1): o
Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(7): o









SIGNATURES
Pursuant to the requirements of the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized.
Absolute Software Corporation
Date:April 14, 2022By:/s/ Christy Wyatt
Name:   Christy Wyatt
Title:   Chief Executive Officer






Form 6-K Exhibit Index
Exhibit No.
Document Description



99.1


EX-99.1 2 absolute_pressreleasexrans.htm EX-99.1 Document
image_0.jpg

Absolute Software Introduces Ransomware Response Offering
Enables organizations to increase strategic preparedness and accelerate endpoint recovery
VANCOUVER, British Columbia and SAN JOSE, Calif. — April 14, 2022 — Absolute Software™ (NASDAQ: ABST) (TSX: ABST), a leader in self-healing endpoint and secure access solutions, today announced the availability of Absolute Ransomware Response, enabling customers to strengthen preparedness and accelerate endpoint recovery in the face of the ever-growing threat of ransomware attacks. With this new offering, part of the company’s Secure Endpoint product portfolio, organizations have the key capabilities and services needed to assess their ransomware preparedness and cyber hygiene across endpoints; ensure mission-critical security applications, such as anti-malware and device management tools, remain healthy and capable of self-healing; and expedite the quarantine and recovery of devices if an attack occurs.
Cybersecurity Ventures predicts that organizations will face a new ransomware attack every two seconds by 2031, up from every 11 seconds in 2021. While the top priority for IT and security teams has historically been securing and restoring critical infrastructure, such as servers and business applications, the accelerated adoption of ‘work-from-anywhere’ has significantly expanded the potential ransomware attack surface – and in turn, has increased the need to extend preparedness and recovery efforts to end user devices.
“The reality is that, while organizations are very concerned about the time to recover from ransomware attacks, they often solely focus on prevention tools, without planning for the worst-case scenario: falling victim to an attack,” said Eric Hanselman, Principal Research Analyst at 451 Research, part of S&P Global Market Intelligence, in a recent webinar. “By building a plan and improving their preparedness and simplifying the endpoint recovery process for their organizations, they can accelerate businesses’ ability to recover and resume operations.”1
“Ransomware is more prevalent, more sophisticated, and more capable of disruption and damage than ever and organizations need to plan for ‘when,’ not ‘if,’ they are successfully attacked,” said John Herrema, EVP of Product & Strategy at Absolute. “When a ransomware attack occurs, organizations are often forced to weigh the risks of cutting off all communication with an infected device, losing the ability to restore or recover it, or leaving the door open for re-infection. This new offering gives them the cyber resiliency needed to mitigate ransomware deployment techniques, restore and update tools critical to recovery, and if needed, hit the ‘kill switch’ – meaning they can wipe the device while still maintaining control so it can be recovered.”
Key capabilities and benefits available with Absolute’s new Ransomware Response offering include:
Assess Strategic Readiness Across Endpoints: Empower customers to review the existing security controls deployed across their endpoints, and identify key applications (e.g., anti-virus/anti-malware, endpoint protection, or endpoint detection and response) and device management tools required to minimize ransomware exposure and accelerate recovery efforts.
2022 Data Theft Report Webinar by Eric Hanselman, 451 Research, part of S&P Global Market Intelligence, March 31, 2022

image_0.jpg
Establish Cyber Hygiene and Resiliency Baseline: Enable application resilience policies that monitor and self-heal the critical controls identified during the assessment phase, to both mitigate the risk of a successful ransomware attack and ensure that tools may be restored if an attack renders them inoperable. This also includes training customer personnel on how to monitor application health and apply these baseline resilience policies to new Absolute-enabled devices.
Monitor Device Security Posture and Sensitive Data: Allow customers to report on hardware and software inventory across their endpoints and assess overall device security posture. Scan for sensitive data – such as financial information, social security numbers, personally identifiable information (PII), protected health information (PHI), and intellectual property – to identify devices most at risk for data extraction and enable proper back-up via customers’ existing tools.
Expedite Device Recovery and Limit Re-Infection: Equip customers with the capabilities needed to communicate with end users even if their devices are compromised; quarantine and freeze endpoints to limit further spread of infection and preserve evidence for litigation purposes; restore endpoint security and device management tools that have been rendered inoperable; and execute custom workflow and task automation commands to expedite device recovery. In addition, Absolute experts are available to remotely assist customers with endpoint recovery efforts leveraging Absolute’s product capabilities.
Absolute Ransomware Response is available for purchase for new customers as part of the company’s Secure Endpoint product offerings. These capabilities are also available as add-on modules for existing Absolute Control and Resilience service tier customers. To learn more, visit here.
About Absolute Software
Absolute Software (NASDAQ: ABST) (TSX: ABST) is a leading provider of self-healing endpoint and secure access solutions, delivering truly resilient zero trust security for today’s distributed workforces. Absolute is the only endpoint platform embedded in more than half a billion devices, offering a permanent digital connection that intelligently and dynamically applies visibility, control and self-healing capabilities to endpoints, applications, and network connections - enabling customers to strengthen cyber resilience against the escalating threat of ransomware and malicious attacks. Trusted by nearly 16,000 customers, G2 recognized Absolute as a leader in Zero Trust Networking and Endpoint Management in the Winter of 2022.
©2022 Absolute ©2022 Absolute Software Corporation. All rights reserved. ABSOLUTE, the ABSOLUTE logo, and NETMOTION are registered trademarks of Absolute Software Corporation. Other names or logos mentioned herein may be the trademarks of Absolute or their respective owners. The absence of the symbols ™️ and ® in proximity to each trademark, or at all, herein is not a disclaimer of ownership of the related trademark.

Media Relations
Becki Levine, Absolute Software
press@absolute.com
858-524-9443

Investor Relations
Joo-Hun Kim, MKR Group
IR@absolute.com
212-868-6760
2022 Data Theft Report Webinar by Eric Hanselman, 451 Research, part of S&P Global Market Intelligence, March 31, 2022

image_0.jpg

Forward-Looking Statements
This press release contains certain forward-looking statements and forward-looking information (collectively, “forward-looking statements”) which relate to future events or Absolute’s future business, operations, and financial performance and condition. Forward-looking statements normally contain words like “will”, “intend”, “anticipate”, “could”, “should”, “may”, “might”, “expect”, “estimate”, “forecast”, “plan”, “potential”, “project”, “assume”, “contemplate”, “believe”, “shall”, “scheduled”, and similar terms and, within this press release, include, without limitation, the statements regarding the ever-growing threat of ransomware attacks, the speed at which a business may recover from a ransomware attack and resume operations and ‘when’ or ‘if’ an organization may face a ransomware attack. Forward-looking statements are provided for the purpose of presenting information about management’s current expectations and plans relating to the future and allowing investors and others to get a better understanding of our anticipated financial position, results of operations, and operating environment. Readers are cautioned that such information may not be appropriate for other purposes.
Forward-looking statements are not guarantees of future performance, actions, or developments and are based on expectations, assumptions and other factors that management currently believes are relevant, reasonable, and appropriate in the circumstances. The material expectations, assumptions, and other factors used in developing the forward-looking statements set out herein include or relate to the following, without limitation: Absolute will be able to successfully execute its plans, strategies, and objectives. Although management believes that the forward-looking statements herein are reasonable, actual results could be substantially different due to the risks and uncertainties associated with and inherent to Absolute’s business, as more particularly described in the “Risk and Uncertainties” section of Absolute’s most recently filed Management’s Discussion and Analysis, which is available at www.absolute.com and under Absolute’s profile on www.sedar.com. Additional material risks and uncertainties applicable to the forward-looking statements herein include, without limitation, unforeseen events, developments, or factors causing any of the aforesaid expectations, assumptions, and other factors ultimately being inaccurate or irrelevant. Many of these factors are beyond the control of Absolute.
All forward-looking statements included in this press release are expressly qualified in their entirety by these cautionary statements. The forward-looking statements contained in this press release are made as at the date hereof and Absolute undertakes no obligation to update publicly or to revise any of the included forward-looking statements, whether as a result of new information, future events, or otherwise, except as may be required by applicable securities laws.
2022 Data Theft Report Webinar by Eric Hanselman, 451 Research, part of S&P Global Market Intelligence, March 31, 2022
GRAPHIC 3 image_0.jpg begin 644 image_0.jpg MB5!.1PT*&@H -24A$4@ 7\ R" ( [ETPV 954E$051X7NV= M=U051QO&Q8*Q@B9 )%8D8@MJ4*S8HG2L*"JBP$5 );8H*BIJ[#$&-4;1+]%@ M%UNLL0+2N8H@*A9 (("%)E&4+M\K-Y"][[;9VS@YW-_9/SB7>6:VS;/O[$ZI M5RDWY15E916E91_*&+?2\I*2\F*LD::XN+BD"OBCHJ("_UM6/GSX(,E3DKE0 M0(AS5!H9&1DA(2'^_OXK5JP0B40.5/=O7UW?__OV1D9$O7[[$&F525E:6 ME)1TY
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end