Absolute Software Consumer Products
Absolute LoJack Logo Absolute Data Protect Logo

Absolute Manage / MDM

The features available with Absolute Manage MDM allow you to remotely manage the iOS, Android, and Windows Phone devices in your deployment. You can wirelessly (over cellular or Wi-Fi) configure, query, and even wipe or lock managed devices. Absolute Manage MDM is available as an on-premise installation or as a cloud-based solution.

Absolute Manage Application Management Icon

Mobile Application Management

Absolute Manage Mobile Application Management Demo Image

  • Track installed apps
  • Build device records using custom data fields
  • Publish a list of approved apps onto each device and provide a single-click download/install process for users
  • Silently install/remove apps using management APIs
  • Securely host, remotely deploy, and distribute in-house apps to end users using AbsoluteApps. Provide users with a list of recommended apps (Apple or Android) for easy selection. Optional configuration profiles can be listed for on-demand installation.
Absolute Manage Security, Change and Configuration Management Icon

Security, Change & Configuration Management

Absolute Manage Mobile Configuration Management Demo Image

  • Set longer, more complex passwords for enterprise level security
  • Lock a device, clear a password, and wipe a device clean to factory settings
  • Manage and deploy profiles to configure email, restrict apps, set up VPN, disable the camera, and deploy web clips
  • Send customized messages and communicate with the end user wirelessly
  • Use AbsoluteFind to track devices on an iPad. Includes access to select administrative and security functions from an iPad
  • Use policy-locked configuration profiles to stop non-compliant devices (jailbroken, blacklisted apps installed) from accessing company email and networks
  • Schedule policies so users have a defined window of time to access secured documents and corporate networks
  • User authentication: Unlike device certificates, Absolute Manage generates unique certificates per user for Exchange email access. So instead of relying upon standard passwords, user authentication can be done seamlessly using certificates. This provides the organization with a much higher degree of security, an improved end user experience, and a significant reduction in password related security and help desk incidents.
Absolute Manage Mobile Content Management Icon

Mobile Content Management

  • Apply strict security controls for the sharing of files and media
  • Distribute sensitive or confidential files to devices without using email
  • Restrict content from being emailed, printed, or moved outside of the AbsoluteSafe repository
  • All content is managed with the same types of automated and dynamic policies used for configuration and provisioning
  • This includes scheduling the availability of content on a device so that it can be automatically deleted based on date and time (down to the minute) regardless if the device is on or off the network
  • Mobile content management includes integration with the corporate SharePoint infrastructure to locate  and assign content to the AbsoluteSafe repository. Distribute files without email. Designate access to media and files by policy and/or schedule (including time-limited access). Delete files from a device at the discretion of IT and control sharing options (print, email, etc.)
Absolute Manage Asset Inventory Icon

Asset Inventory

Absolute Manage Asset Inventory Demo Image

  • Gather hardware and software data points for analysis
  • Display data such as serial numbers, Mac addresses, installed apps, telephone numbers, and other data with custom views, searches, and reports
  • Integrate your mobile device data with third party applications such as Microsoft SCCM
Absolute Manage BYOD Icon


Absolute Manage BYOD Demo Image

  • Read our BYOD Policy Implementation Guide for best practices
  • Use the automated employee enrollment process to onboard employees and their personally owned devices, eliminating the manual IT work associated with BYOD programs
  • Record employee opt-in and direct a copy of each confirmation to Human Resources
  • Automatically assign BYOD-specific policies to ensure these devices only access corporate networks and data if they are compliant
  • Learn more about BYOD