Products & Solutions

Absolute's products and solutions empower businesses with cutting-edge security and resilience tools. Here, you’ll find blog posts packed with expert insights on Absolute’s technology and capabilities.

Explore our Blog Library

Topic
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
Absolute Unwraps AI Threat Insights
AI-centric dashboard—highlighting real-time threat intelligence powered by AI.
Products & Solutions

Absolute Unwraps AI Threat Insights

Get proactive AI alerts on suspicious behavior — Comprehensive alerts on user, device, network, and application behavior to detect issues before they become problems.
Generative AI
Access Resilience
Threat Protection
Shadow IT
Ransomware
Absolute Security Automates Remediation for CrowdStrike and other Windows BSOD Incidents
Blue Screen of Death (BSOD) error on a computer screen
Products & Solutions

Absolute Security Automates Remediation for CrowdStrike and other Windows BSOD Incidents

On July 19, 2024, CrowdStrike’s update caused a BSOD outage. Absolute Security provided tools to remotely repair affected endpoints and prevent future issues.
Endpoint Resilience
Compliance
Resilience
Applied Resilience with Absolute Secure Endpoint
Applied resilience concept illustration
Products & Solutions

Applied Resilience with Absolute Secure Endpoint

Align cyber resilience goals to real-world threats and implement a strategy to adapt to multiple failure points if endpoint defenses are impaired during an attack.
Endpoint Resilience
Threat Protection
Resilience
Absolute Investigations Device Recovery Success Stories Winter 2024
Successful digital investigation—illustrating resolution and cyber risk mitigation.
Products & Solutions

Absolute Investigations Device Recovery Success Stories Winter 2024

When it comes to managing your devices, and more specifically, stolen laptops, Absolute customers have an important resource to lean on. The Absolute Investigations Team.
Data Protection
IT Asset Management
Recover Missing Devices
Absolute Secure Endpoint 8.0 Adding a New Level of Endpoint Resilience
Security event banner—framing advanced cybersecurity strategies.
Products & Solutions

Absolute Secure Endpoint 8.0 Adding a New Level of Endpoint Resilience

Absolute Secure Endpoint 8.0 enhances the Absolute Console’s navigation flow, additional Device Usage events, discovering sensitive files across endpoints with greater flexibility, contextual Geo information, and more.
Data Protection
Endpoint Resilience
IT Asset Management
Six Steps To Effective Healthcare Data Breach Response
Healthcare data breach visual—underscoring patient data protection risks.
Products & Solutions

Six Steps To Effective Healthcare Data Breach Response

Healthcare organizations must adapt to evolving cybersecurity threats with a focused data breach response plan. In 2025, reducing risk and ensuring compliance are key priorities.
Compliance
Data Protection
Ransomware
Application Health Monitoring for Business Productivity and Security Applications
Dashboard metrics—illustrating real-time application performance monitoring.
Products & Solutions

Application Health Monitoring for Business Productivity and Security Applications

Introducing Absolute Application Health. Users can now monitor the health of over 2,000 of the most used Windows and Mac applications across enterprise organizations.
Data Protection
Endpoint Resilience
Application Resilience
Absolute Investigations Device Recovery Success Stories Fall 2023
Magnifying glass and keyboard—representing digital investigations and threat analysis.
Products & Solutions

Absolute Investigations Device Recovery Success Stories Fall 2023

Endpoints remain a leading gateway for cyber criminals across all industries. But when it comes to stolen laptops, Absolute customers have an important resource to lean on - the Absolute Investigations Team.
Data Protection
Endpoint Resilience
Recover Missing Devices
The Pressing Need for Self-Healing Apps and Network Resilience
Cybersecurity awareness banner—promoting safe digital behavior.
Products & Solutions

The Pressing Need for Self-Healing Apps and Network Resilience

Endpoint security is only part of the equation. Self-healing apps help mitigate vulnerabilities by ensuring application health, reducing risks and complexity.
Endpoint Resilience
Data Protection
Threat Protection
New SOC 2 Attestations for Absolute Secure Endpoint and Secure Access
Female tech professional—illustrating women in cybersecurity leadership.
Products & Solutions

New SOC 2 Attestations for Absolute Secure Endpoint and Secure Access

Absolute Secure Endpoint and Absolute Secure Access have reached two important SOC 2 framework milestones for secure, robust systems.
Data Protection
Resilience
Remote Work
How The Platform Approach to Zero Trust Helps Organizations Strengthen Security, Reduce Complexity
Zero Trust architecture illustration—depicting secure access frameworks.
Products & Solutions

How The Platform Approach to Zero Trust Helps Organizations Strengthen Security, Reduce Complexity

Considering a zero trust strategy? Get the new report from Forrester that outlines core use cases, the business value it delivers, and the dynamics and vendors driving the market.
Zero Trust
Data Protection
Endpoint Resilience
Strengthening your Compliance & Security Posture for Government
Government compliance report—focusing on cybersecurity in public institutions.
Products & Solutions

Strengthening your Compliance & Security Posture for Government

How can government agencies stay secure while managing compliance? Discover key strategies for protecting citizen data, addressing risks, and meeting regulatory standards.
Data Protection
Resilience
Compliance