Products & Solutions

Absolute's products and solutions empower businesses with cutting-edge security and resilience tools. Here, you’ll find blog posts packed with expert insights on Absolute’s technology and capabilities.

Explore our Blog Library

Topic
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
Supercharge Integrations with the Absolute API Library and Absolute Connector for ServiceNow
Developer workspace—highlighting modern software security practices.
Products & Solutions

Supercharge Integrations with the Absolute API Library and Absolute Connector for ServiceNow

As part of the Absolute Secure Endpoint 7.21 release, Absolute has made significant enhancements for customers to supercharge integrations with other software products in their environments to address software bloat and reduce associated risk.
Data Protection
Application Resilience
Endpoint Resilience
Absolute Software Secure Access Product Line Earns Leadership Position in KuppingerCole Zero Trust Network Access Leadership Compass
KuppingerCole report cover, highlighting cybersecurity insights and industry analysis.
Products & Solutions

Absolute Software Secure Access Product Line Earns Leadership Position in KuppingerCole Zero Trust Network Access Leadership Compass

Security and risk leaders can use report to understand how Absolute’s unique Resilience and self-healing capabilities ensure always-on ZTNA.
Data Protection
Access Resilience
Endpoint Resilience
Endpoints: The Weak Link in Your Security Posture
Endpoint management graphic—illustrating secure device control in enterprises.
Products & Solutions

Endpoints: The Weak Link in Your Security Posture

To combat the many security gaps found in the remote workforce landscape, you need a layered approach that includes access management, network security, and endpoint management. This is the foundation of zero trust.
Data Protection
Endpoint Resilience
IT Asset Management
Absolute Investigations April and May Device Recovery Success Stories
Variety of laptops on table—depicting diversified enterprise device usage.
Products & Solutions

Absolute Investigations April and May Device Recovery Success Stories

The Absolute Investigations Team consists of former law enforcement professionals who are trained to help navigate the circumstances of stolen property and recover stolen laptops.
Data Protection
Endpoint Resilience
Remote Work
How To Manage End-Of-Year Device Collection Chaos
Laptop on beach chair—showcasing endpoint security during summer breaks.
Products & Solutions

How To Manage End-Of-Year Device Collection Chaos

As the school year ends, K-12 IT teams face the challenge of recovering devices from students. Here's how to streamline the process, secure devices, and maintain sanity.
Recover Missing Devices
Data Protection
IT Asset Management
Absolute Ransomware Response: Providing an Advantage for Preparedness and Recovery
Padlock symbolizing cybersecurity measures against ransomware threats
Products & Solutions

Absolute Ransomware Response: Providing an Advantage for Preparedness and Recovery

Absolute Ransomware Response was developed based on extensive experience responding to and recovering endpoints from ransomware.
Ransomware
Data Protection
Endpoint Resilience
Introducing Resilient Zero Trust Security for the Work-from-Anywhere Perimeter
Remote workspace setup—showcasing hybrid work cybersecurity needs.
Products & Solutions

Introducing Resilient Zero Trust Security for the Work-from-Anywhere Perimeter

Secure remote access with resilient ZTNA technology is critical for hybrid workforces—ensuring productivity without compromising security.
Zero Trust
Endpoint Resilience
Remote Work
Absolute Investigations January and February Device Recovery Success Stories
Abandoned laptop bag—conveying risk of device loss and data theft.
Products & Solutions

Absolute Investigations January and February Device Recovery Success Stories

The cost of replacing a device is one headache, the inconvenience of being without your laptop is another. But far and away the most severe implication of a stolen laptop is losing control over the data that resides on your device.
Data Protection
Endpoint Resilience
Recover Missing Devices
Absolute Beta for Hyper-Resilient, Cloud-First ZTNA Deployment Architecture is Now Open
Professional in relaxed workspace—showcasing flexible work environments.
Products & Solutions

Absolute Beta for Hyper-Resilient, Cloud-First ZTNA Deployment Architecture is Now Open

We’re excited to announce a new beta program for our hyper-resilient, cloud-first ZTNA architecture. Enrollment is now open.
Endpoint Resilience
Data Protection
Zero Trust
Absolute Investigations December 2021 Roundup Device Recovery Success Stories
Stolen laptop on chair—emphasizing data protection and recovery measures.
Products & Solutions

Absolute Investigations December 2021 Roundup Device Recovery Success Stories

While we have a talented, hard-working team of investigators at Absolute, let’s hope we won’t have so much work to do in 2022!
Endpoint Resilience
Data Protection
Recover Missing Devices
For Schools Seeking Stronger 1:1 Programs Absolute Introduces New Resilience for Student Devices
Student studying with laptop—highlighting cybersecurity in digital classrooms.
Products & Solutions

For Schools Seeking Stronger 1:1 Programs Absolute Introduces New Resilience for Student Devices

For districts to better manage here-to-stay 1:1 programs, Absolute has introduced Absolute Resilience for Student Devices.
Data Protection
Endpoint Resilience
IT Asset Management
Absolute Investigations November Roundup: Device Recovery Success Stories
Forgotten laptop on table—depicting physical security challenges in hybrid work.
Products & Solutions

Absolute Investigations November Roundup: Device Recovery Success Stories

When planning for 2022 budgets, many organizations will build in money for new devices. Laptops often represent a sizable percentage of that budget for many, and no one wants to have to factor in added cost for stolen devices.
Data Protection
Recover Missing Devices
Endpoint Resilience