Products & Solutions

Absolute's products and solutions empower businesses with cutting-edge security and resilience tools. Here, you’ll find blog posts packed with expert insights on Absolute’s technology and capabilities.

Explore our Blog Library

Topic
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
Strengthening the Compliance and Security Posture in Healthcare
Healthcare compliance report visual—focused on HIPAA and data integrity.
Products & Solutions

Strengthening the Compliance and Security Posture in Healthcare

With cyberattacks on healthcare up 74% in 2022, protecting patient information has become a top priority. Learn how to navigate compliance challenges safely.
Compliance
Data Protection
Endpoint Resilience
Strengthening the Compliance and Security Posture in Enterprise
Enterprise compliance report—visualizing corporate risk management.
Products & Solutions

Strengthening the Compliance and Security Posture in Enterprise

Every 39 seconds, a business is targeted by a cyberattack. Will yours be next? Learn how key cybersecurity frameworks can help safeguard your organization.
Compliance
Endpoint Resilience
Data Protection
Strengthening the Compliance and Security Posture in Education
Education compliance report header—highlighting K-12 and higher-ed regulation.
Products & Solutions

Strengthening the Compliance and Security Posture in Education

With 87% of schools facing cyberattacks, safeguarding student data is non-negotiable. Discover how to ensure FERPA compliance and strengthen your cybersecurity strategy.
Compliance
Data Protection
Resilience
Absolute Investigations Device Recovery Success Stories Winter 2023
Focused user working—ensuring endpoint security and compliance readiness.
Products & Solutions

Absolute Investigations Device Recovery Success Stories Winter 2023

New years bring plenty of change, but one unfortunate constant we can count on is more laptop theft. The Absolute Investigations Team helps customers retrieve stolen laptops using our firmware-embedded Persistence® technology.
Data Protection
Endpoint Resilience
Recover Missing Devices
Absolute Achieves FedRAMP Ready Designation
FedRAMP blog visual—demonstrating government cloud security certification.
Products & Solutions

Absolute Achieves FedRAMP Ready Designation

Absolute has been designated FedRAMP Ready, at the moderate security impact level, and is now listed in the Federal Risk and Authorization Management Program Marketplace for US federal agencies and government contractors.
Compliance
Endpoint Resilience
Threat Protection
Endpoints are the First Line of Defense at the Edge, Are Yours Resilient Against Attacks?
Colleagues brainstorming—representing collaborative cybersecurity planning.
Products & Solutions

Endpoints are the First Line of Defense at the Edge, Are Yours Resilient Against Attacks?

To help global security and risk professionals make smarter decisions about how to defend their organizations against cyberattacks, Omdia released its Market Radar for Endpoint Security Platforms, 2022. Absolute is a 'Vendor to Watch.'
Data Protection
Endpoint Resilience
Resilience
Remote Work
Absolute Investigations Device Recovery Success Stories Fall 2022
Open laptop on minimalist workspace—highlighting productivity and endpoint security.
Products & Solutions

Absolute Investigations Device Recovery Success Stories Fall 2022

The Absolute Investigations Team consists of former law enforcement professionals who are trained to help navigate the circumstances of stolen property and recover stolen laptops.
Data Protection
Endpoint Resilience
Recover Missing Devices
Supercharge Integrations with the Absolute API Library and Absolute Connector for ServiceNow
Developer workspace—highlighting modern software security practices.
Products & Solutions

Supercharge Integrations with the Absolute API Library and Absolute Connector for ServiceNow

As part of the Absolute Secure Endpoint 7.21 release, Absolute has made significant enhancements for customers to supercharge integrations with other software products in their environments to address software bloat and reduce associated risk.
Data Protection
Application Resilience
Endpoint Resilience
Absolute Software Secure Access Product Line Earns Leadership Position in KuppingerCole Zero Trust Network Access Leadership Compass
KuppingerCole report cover, highlighting cybersecurity insights and industry analysis.
Products & Solutions

Absolute Software Secure Access Product Line Earns Leadership Position in KuppingerCole Zero Trust Network Access Leadership Compass

Security and risk leaders can use report to understand how Absolute’s unique Resilience and self-healing capabilities ensure always-on ZTNA.
Data Protection
Access Resilience
Endpoint Resilience
Endpoints: The Weak Link in Your Security Posture
Endpoint management graphic—illustrating secure device control in enterprises.
Products & Solutions

Endpoints: The Weak Link in Your Security Posture

To combat the many security gaps found in the remote workforce landscape, you need a layered approach that includes access management, network security, and endpoint management. This is the foundation of zero trust.
Data Protection
Endpoint Resilience
IT Asset Management
Absolute Investigations April and May Device Recovery Success Stories
Variety of laptops on table—depicting diversified enterprise device usage.
Products & Solutions

Absolute Investigations April and May Device Recovery Success Stories

The Absolute Investigations Team consists of former law enforcement professionals who are trained to help navigate the circumstances of stolen property and recover stolen laptops.
Data Protection
Endpoint Resilience
Remote Work
How To Manage End-Of-Year Device Collection Chaos
Laptop on beach chair—showcasing endpoint security during summer breaks.
Products & Solutions

How To Manage End-Of-Year Device Collection Chaos

As the school year ends, K-12 IT teams face the challenge of recovering devices from students. Here's how to streamline the process, secure devices, and maintain sanity.
Recover Missing Devices
Data Protection
IT Asset Management
Sorry, no items found...