Absolute Security Blog
Get expert insights on endpoint resilience, Zero Trust, ransomware defense, digital transformation, and more—so you can stay ahead of what’s next.
Add title here
Add title here
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Et ille ridens: Video, inquit, quid agas; Cur, nisi quod turpis oratio est? Duo Reges: constructio interrete. Tu quidem reddes; Oratio me istius philosophi non offendit;
Add title here
Add title here
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Et ille ridens: Video, inquit, quid agas; Cur, nisi quod turpis oratio est? Duo Reges: constructio interrete. Tu quidem reddes; Oratio me istius philosophi non offendit;
Blog library
Oops! Something went wrong while submitting the form.
No results found.
There are no results with this criteria. Try changing your search.

Expert Insights
Embrace The Shadow IT Mindset Not The Shadow
It may sound like a clandestine mission or something out of crime drama, but Shadow IT is actually a very common, everyday occurrence. And it has been happening in organizations (yours included) for decades.
April 14, 2020
Threat Protection
Shadow IT
Application Resilience
Resilience

Products & Solutions
Strengthening Device Management And Endpoint Security Just Got Easier With Absolute Power Of Resilience
This week, we announced that the power of Absolute’s Resilience solution and patented Absolute® Persistence™ technology now extends to more than 30 critical security applications.
February 5, 2020
Data Protection
Endpoint Resilience
Application Resilience

Customers
Apria Healthcare Sees And Secures 8,000 Devices With Absolute
With Absolute Persistence already installed in the BIOS of their endpoint devices, Apria found unbreakable endpoint visibility and control by simply turning Persistence on.
January 16, 2020
Endpoint Resilience
Data Protection
IT Asset Management

Products & Solutions
Tracking Recovering Missing Devices After the Holidays
Not only is the holiday season prime time for thieves to stock up on valuable electronics left in airports, vehicles and cafes, but it’s also common for students and staff to misplace school-owned devices at home or while traveling.
January 7, 2020
Recover Missing Devices
Data Protection
Endpoint Resilience

Inside Absolute
Absolute CEO Christy Wyatt Recognized As Top 50 Women Leaders In Saas Of 2019
We’d like to congratulate all the 2019 leader awardees and give a special shout out to one honoree in particular – our CEO Christy Wyatt.
October 30, 2019
Data Protection
Endpoint Resilience
Resilience

Inside Absolute
Absolute Named Leader In G2 Fall 2019 Grid Report For Endpoint Management
Thanks to high levels of customer satisfaction and positive reviews from verified users, G2 has - for the second time this year - named Absolute a leader in the Fall 2019 Grid Report for Endpoint Management Software.
October 18, 2019
Data Protection
Endpoint Resilience
Recover Missing Devices

Expert Insights
What Is Cyber Resilience And How Can You Achieve It
A cyber resilient company is in the best position to prepare for, respond to, and recover from a cyberattack. Being resilient, however, means much more than attack prevention or response.
September 20, 2019
Compliance
Endpoint Resilience
Resilience

Expert Insights
4 Recent Data Breaches That Originated On The Endpoint
As data breaches become more frequent, organizations must focus on securing endpoints to prevent vulnerabilities and mitigate the risks of costly breaches.
August 26, 2019
IT Asset Management
Endpoint Resilience
Threat Protection

Products & Solutions
Quantifying K 12 Device Use With Absolute
Discover how Loudoun County Public Schools boosted device utilization and security for personalized learning using Absolute’s endpoint protection and tracking.
July 12, 2019
Data Protection
Endpoint Resilience
IT Asset Management

Products & Solutions
What Is Endpoint Management?
Effective endpoint management is key to securing devices and sensitive data. Discover why managing endpoints is critical for staying ahead of evolving cyber threats.
March 1, 2019
Data Protection
Endpoint Resilience
Threat Protection

Customers
How LA Tourism Secures A Distributed Workforce
The structure of work is changing rapidly. Driven by technology advancement, a global economy and a constant push for more productivity, there is a fast-moving trend toward enabling a distributed workforce.
February 11, 2019
Data Protection
IT Asset Management
Remote Work

Products & Solutions
How Experts Track Stolen Laptops
Learn how experts track and recover stolen laptops to protect sensitive data. Discover three crucial steps you can take to safeguard your organization.
January 9, 2019
Endpoint Resilience
IT Asset Management
Compliance

Customers
How The Cook County Sheriff Lights Up Dark Endpoints
The Cook County Sheriff's Office (CCSO) is the second largest sheriff’s department in the U.S. with over 6,900 members when at full operational strength. CCSO now uses the Absolute platform for about 4,100 workstations.
September 26, 2018
Data Protection
IT Asset Management
Threat Protection

Customers
How Greenville Health Systems Improved Endpoint Security And Achieved Hipaa Compliance
Greenville Health Systems needed to prove their systems were encrypted to industry standards. But before they were able to achieve this, they needed to measure their risk exposure across the organization.
July 16, 2018
Compliance
Data Protection
Threat Protection

Expert Insights
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…
The NIS Directive was designed to focus on key critical portions of Member States’ information technology infrastructures – all the basic services a nation needs to operate today.
February 16, 2018
Compliance
Data Protection
Threat Protection