
Recommended:
Global CISOs share the biggest challenge facing cybersecurity teams today
Industries
Education
If you want to best equip your students for the new economy, a forward-looking device program is a must. But device programs pose risks to students and budgets that you need to mitigate. Get actionable advice and see how Absolute can help.
Healthcare
The digital revolution in healthcare has brought boons and risks to healthcare agencies everywhere. Get resources that teach you how to protect data and devices while improving patient health outcomes.
Government
The demands on modern government agencies are endless: compliance, budgets, public pressure, and more. Streamline your IT and security efforts with these resources, so you can meet and exceed your mandates.
Financial Services
Financial services corporations have to deal with some of the most stringent regulations on the planet. Use these resources to stay compliant, protect sensitive data, and get all the benefits of a digitally connected workforce.
Professional Services
Legal, accounting, and consulting firms are trusted with some of their clients' most valuable data. Stay compliant and safeguard your clients' knowledge with actionable advice from Absolute.
Enterprise
For enterprises that want to stay competitive, a mobile, connected, and secure workforce is essential. Get actionable advice on securing your data and devices, reducing costs, complying with frameworks, and raising productivity.
Research Reports
The Third Question: What CISOs Aren't Asking, and What's at Stake
Discover what critical question CISOs are failing to ask and why it’s leaving organizations open to risk, with advice and insight from four of the world’s top cybersecurity innovators.
Distance Learning's Impact on Education IT
Read the definitive report on endpoint health, device usage and security as schools adapt to remote and hybrid learning. Learn the new priorities for IT in K-12 education.
2020: The State of Endpoint Resilience™️ Report
Explore the forces driving global trends in endpoint OS and application health, sourced from 8.5 million anonymized Absolute-enabled endpoints.
Whitepapers & eBooks
The Third Question: What CISOs Aren't Asking, and What's at Stake
Discover what critical question CISOs are failing to ask and why it’s leaving organizations open to risk, with advice and insight from four of the world’s top cybersecurity innovators.
G2 2021 Winter Report - Endpoint Management Software
Which endpoint management tools do your peers recommend? Secure your data and devices with a G2 leader.
Secure Federal Data and Support Your Mobile Workforce
Federal IT must support a large user base increasingly working from home where they take their devices—and the Federal data they contain—with them.
Securing and Enabling Your Remote Workforce
As organizations adapt to — and even embrace — remote work, enabling productivity without sacrificing security is more important than ever. Here are five steps to help you along the way.
Absolute Persistence
Get to know Persistence, the only technology that keeps you in complete command with a self-healing, two-way connection to any endpoint or application — even off your network.
Achieving HIPAA Compliance
Identify authorized and unauthorized devices on your network, ensure optimal security configurations, and conduct HIPAA & HITECH risk assessments with Absolute.
Complying with GDPR: What All Organizations Need to Know
Prepare for audits and verify compliance with GDPR, so you can increase customer trust and avoid devastating fines.
Data Breach Prevention for Healthcare
Of the many pressures on healthcare organizations — quality, efficiency, affordability, and more — patient information security is often overlooked. Take these steps to prevent costly breaches.
Effective Healthcare Data Breach Response
Healthcare IT departments aren't just battling regulatory transformation — they're fighting off cybercriminals. Follow these six steps to mitigate the damage of a potential security incident.
How to Provide a Safe Learning Environment
Use Absolute to enact comprehensive security and awareness programs that will increase IT efficiency and foster a safe environment for students and staff.
NIST Cybersecurity Framework Implementation
Use these clear guidelines to implement the NIST's cybersecurity framework within your own organization.
The Cost of a Data Breach in Healthcare
New data protection regulations have increased the risk of fines and settlement fees. Learn how to avoid a costly data breach and embrace the digital healthcare revolution.
Implementing the NIST Cybersecurity Framework for Government
Calling all CIOs and CISOs in government! Optimize your approach to security and management with this practical guide, so you can safely get all the benefits of a distributed workforce.
Application Persistence
Get the details on Application Persistence, Absolute's one-of-a-kind platform that offers unstoppable reporting and remediation to any app that runs on Windows 7 or higher.
Data Breach Prevention - Back to basics with IT security best practices
You've acquired plenty of tools to prevent data breaches — but is your organization doing the little things right? Take these steps to ensure you're optimizing for breach prevention.
3 Overlooked Data Privacy Considerations
We live in a dematerialized world, which makes data privacy more important than ever. Learn what's at stake for your organization and plan your next steps.
Data Breach Response Revisited
Your data is valuable, which means it's attractive to cybercriminals. Understand what's at stake, how to deter breaches, and how to respond when one occurs.
Solution Sheets
Absolute for Energy and Utilities
As the energy industry becomes more complex and distributed, it's more crucial than ever to see and protect all your endpoints. Learn how Absolute can help.
Absolute for Financial Services
Meet internal and regulatory requirements for data security on all your devices with Absolute's powerful suite of tools.
Absolute for GDPR Compliance
Stay audit-ready with our practical guide to GDPR – and be completely ready with Absolute's always-on visibility, control, and resilience.
Absolute for Government
Leverage Absolute to enable a secure digital government, and increase your IT and security efficiency, accuracy and confidence. Stay compliant on all your endpoints.
Absolute for Higher Education
Colleges and universities need to square their need for information with compliance risks and cybersecurity threats. Strike the balance with Absolute's endpoint visibility and control.
Absolute for K-12 Education
See, manage, control and validate appropriate usage across your entire device population — whether they're Chromebook, Windows, or Mac devices.
Absolute for Legal Services
Law firms are trusted with some of their clients' most sensitive data. Protect it — and your IT assets — with Absolute's unprecedented endpoint visibility and control.
Benchmark Your Security Posture with Cybersecurity Frameworks
Use Absolute to see all your assets, then continuously measure and improve against security best practices such as NIST CSF, HIPAA or CIS.
Secure the Digital Healthcare Revolution
Learn how Absolute gives you the power to identify potential security threats and respond rapidly before they become security incidents that require breach notifications.
Absolute for IT Asset Management
Remote workforces and BYOD programs have added layers of complexity to IT asset management. Use Absolute to prove compliance, reduce asset losses, and drive efficiencies.
Evaluation Guides
CIS Critical Security Controls Evaluation Guide
Defend your organization better by prioritizing and implementing the best practices recommended by the Center for Internet Security.
CJIS Security Policy Evaluation Guide
Want access to CJIS systems and information? You'll need to meet their benchmarks for endpoint security. Do it quickly with Absolute.
HIPAA Compliance Evaluation Guide
Use this comprehensive checklist to assess your organization's data security. See how Absolute can help you attain and maintain HIPAA compliance.
HITECH Compliance Evaluation Guide
Achieve HITECH compliance across your endpoint population with this comprehensive checklist. And do it faster with Absolute.
NIST Cybersecurity Framework Evaluation Guide
How does your organization stack up against the gold-standard cybersecurity framework? Find out with this detailed checklist.
Infographics
Distance Learning's Impact on Education IT
Learn the new priorities for education IT from the definitive report on K-12 endpoint health. Get key insights on device usage, security and more as schools adapt to remote and hybrid learning.
The 2020 State of Endpoint Resilience™️ Infographic
Report findings at-a-glance, highlighting key trends, threats and opportunities in endpoint OS and application health.
5 Steps to Adapt your Devices to Online Learning
Follows these steps to ensure safe and secure remote learning
6 Steps to Effective Data Breach Response
Follow these steps to respond to any breaches involving sensitive healthcare data.
2019 Endpoint Security Trends Report
Learn where enterprises are most vulnerable and how you can build true resilience. We analyzed over 6 million endpoint devices to bring you these insights.
The State of the Digital District: K-12 Endpoint Trends Report
Get insights into the K-12 cybersecurity crisis in this research report compiled from analyzing more than three million student devices over one year.
Nailing It! How to Win with the NIST Cybersecurity Framework
See how you stack up against other organizations in implementing the five pillars of the NIST Cybersecurity Framework: Identify, Protect, Detect, Respond, and Recover.
Protecting PHI in 7 Steps
Healthcare is data. Take these specific and practical steps for secure digital care and data protection across all your devices, no matter where they are.
Product Videos
Automate Endpoint Management Tasks Remotely
See how Absolute Reach lets you automate and extend your IT capabilities off-network. Remotely gather information and perform critical actions like setting admin passwords and installing or uninstalling applications.
Fix Endpoint Vulnerabilities and Enforce Operating System Updates
Learn how Absolute Reach helps you automate and expand your IT capabilities, so you can respond efficiently to vulnerabilities and act quickly to protect your users, devices, and data - even off-network.
Webinars
The Third Question: What CISOs Aren't Asking, and What's at Stake
Join innovator and former CISO of Citi, JP Morgan, and Deutsche Bank, Charles Blauner, for a fireside chat with Absolute’s CEO, Christy Wyatt, as they explore managing complexity amidst the ever-evolving threat landscape.
Application Persistence: How to Secure Your Security
Understand the value of leveraging Application Persistence, how to enable, configure and activate it for your critical applications and reporting on application health and compliance.
Distance Learning’s Impact on Education IT
Get the data and key insights required to successfully meet the new realities facing IT in K-12 education.
Standardize your compliance reporting and control your remote devices
Our product experts will demonstrate the intelligence and tools you can use to manage devices with at-risk data — anytime and from anywhere.
K-12 Peer Advice Forum: What’s Working for IT and Security Teams
Success stories from the front lines of the remote learning transition. This first K-12 Peer Advice session features Eric Ramos, CTO of California’s Duarte School District.
The State of Endpoint Resilience in 2020 – A Critical Discussion featuring Forrester
Absolute and featured guest Forrester, reveal key trends impacting endpoint health, fragility, and complexity – and the unexpected challenges introduced by remote work and distance learning.
3 Essential Actions to Manage and Secure Remote Devices
Ensure continuity for your IT and security processes with Absolute's remote device actions. Learn how to protect your organization's data and secure devices with 3 critical features: Device Freeze, Device Wipe and Data Delete.
3 Immediate Actions to Save Time While Managing Online Learning
Learn to use the new Web Usage reporting to pinpoint exactly where, and for how long, students spend their time online. Gain best practices for device collection, as well as effectively operating a remote helpdesk to support students and staff.
Product Briefing: Critical Steps to Secure and Manage Your Remote Workforce
Workforces across the globe are going remote. These valuable and practical tactics will help you optimize your endpoints and Absolute console for security and productivity — no matter where your end users are.
Five Easy Ways to Transform Your Absolute Account
Many different factors influence the health of your endpoints. This 45-minute power session will help you maximize your account health as we share easy-to-implement tips.
Effective Asset Lifecycle Management
From initial deployment to the eventual end-of-life process, find out how to use Absolute to its fullest in order to maintain the integrity and maximize the value of your devices.
Five Steps to Safeguarding Your Digital District
School-provided devices are proliferating. Application management is increasingly complex. And students are more digitally savvy than ever. The result? Schools are more vulnerable than ever before. But we have solutions for you.
Tracking and Recovering Missing Devices
Get a rundown of Absolute's tools for managing your lost or stolen devices. Learn where they are, who’s using them, and how to locate them with the Absolute console.
Nailing It! 5 Ways to Win with the NIST Cybersecurity Framework
See how you stack up against other organizations in implementing the five pillars of the NIST Cybersecurity Framework: Identify, Protect, Detect, Respond, and Recover.
7 Steps to Protecting Data in the Era of Digital Care
Healthcare is data. Take these specific and practical steps for secure digital care and data protection across all your devices, no matter where they are.
5 Essentials for Securing and Managing Windows 10
This one-hour investment will pay dividends, whether you're planning on migrating or already have. Learn how to deploy and utilize the many security enhancements in Win10 — without the pitfalls.
Cyber Threat Checklist: Are You Prepared?
The most effective way to handle a cybersecurity incident? Keep it from happening in the first place. Protecting your organizations valuable data starts with a solid cybersecurity strategy for preventing both insider and external threats.
Customer Videos
Anaheim Union High School District
Learn how the Anaheim Union High School District uses Absolute to manage and secure tens of thousands of Chromebook, Mac, and PC devices.
Apria Healthcare
Learn how Apria uses Absolute to secure, control, and manage over 8,000 remoted devices, protecting PHI for millions of patients.
Asplundh Tree Expert
Asplundh has a highly-mobile workforce and thousands of distributed endpoints. Learn how they keep constant visibility and control over their devices with Absolute.
Cook County Sheriff's Office
See how the Cook County Sheriff’s Office uses Absolute to control their endpoints, maintain transparency, and gain valuable insights on device usage.
Greenville Health System
With 7 hospitals and over 15,000 employees, Greenville Health System is responsible for an ocean of PHI. See how they’ve secured it with Absolute.
Santa Margarita Catholic High School
See how Absolute helps Santa Margarita enable a secure and effective 1-1 device program.
Case Studies
Allegis Group
Learn how Absolute Application Persistence delivers reliability to Allegis Group.
Allina Health
Learn how Allina Health prevents costly data breaches with Absolute.
Anaheim Union High School District
Anaheim Union HSD decreases device theft with comprehensive fleet visibility and control and increased device tracking accuracy.
Apria Health
Learn how Apria Healthcare delivers enriched patient care with Absolute.
Asplundh
Learn how by activating Absolute on their endpoints and incorporating Absolute into their standard device image, Asplundh gained uncompromised visibility of its entire device fleet.
Baltimore City Public School System
Learn how Baltimore City Public Schools delivers secure technology to the classroom.
Bovis Homes
Bovis Homes had a problem with missing endpoints. Due to the large number of temporary employees working remotely, devices often went rogue. They faced GDPR risks as well. See how Absolute helped them overcome these issues.
Caresource PHI
Learn how CareSource is protected and compliant with the Health Insurance Portability and Accountability Act (HIPAA).
Cayman Islands Ministry of Education
Learn how Absolute helps the Ministry retrieve stolen devices and deter future thefts.
Centre Hospitalier Universitaire
Learn why the computers that CHU de Clermont-Ferrand purchases now come pre-loaded with Absolute.
Cigna Healthspring
Learn why the Cigna-HealthSpring IT Team sleep better at night knowing their data is secure on-the-go with Absolute.
Community Medical Centers
See how the San Joaquin Valley's largest hospital system uses Absolute to ensure encryption and protection of sensitive patient data.
Creative Lodging Solutions
Learn how, with Absolute on the company’s devices, CLS can rest easy knowing that it's protecting sensitive data and will retain its value as unique intellectual property.
Dorset & Wiltshire Fire and Rescue Service
Dorset & Wiltshire Fire and Rescue Service Tracking, repairing and recovering devices while ensuring tamper-proof security of sensitive information are critical capabilities to the DWFRS. See how they secure and persist all of their mobile devices with Absolute.
Duarte Unified School District
See why Duarte Unified School District selected Absolute’s Web Usage to enable them to stand up, monitor, manage and measure their distance learning programs amidst the COVID-19 outbreak.
Emergency Communications of Southern Oregon
Learn how Absolute helps ECSO ensure compliance with the CJIS Security Policy and save lives in the field.
Euromonitor
Learn how Euromonitor secures proprietary market research with Absolute.
Fresno Unified School District
Learn how Fresno Unified School District manages and secures 100,000 device fleet with Absolute Resilience®
Greenville Health System
Learn how Greenville has been steadily growing their relationship with Absolute and currently has their solution installed on 14,000 devices with plans to add more.
Indiana Charter School Network and Goodwill Industries
Learn how Goodwill Industries with Indiana Charter School Network deterred theft, ensured network compliance, and monitored their inventory with Absolute.
KCOM
Learn how KCOM ensures compliance with the GDPR regulation, strengthens its security posture, and increases operational efficiency with Absolute.
Klein Independent School District
Learn how Klein Independent School District is leveraging Absolute’s Student Technology Analytics to improve learning outcomes, protect student data, and demonstrate technology ROI.
Kristinehamns Kommun
Learn how this Swedish local authority cut laptop thefts by 85%, preserved budgets and improved the learning experience of all the pupils at their schools.
Las Vegas Valley Water District Authority
Learn how the Las Vegas Valley Water District Authority saves time, money and stress with Absolute.
Los Angeles Tourism & Convention Board
Learn how the Los Angeles Tourism & Convention Board manages and protects their global workforce's devices and data with Absolute.
Loudoun County Public Schools
Learn how Absolute enables personalized learning at Loudoun County Public Schools by minimizing risk and increasing device utility.
Ogletree Deakins
Ogletree Deakins has made data security one of the pillars of their technology implementation. See how they use Absolute to secure their sensitive data, comply with regulations such as GDPR or HIPAA and reinforce active encryption and anti-malware.
PA Cyber
A pioneer in remote learning, PA Cyber relies on Absolute for unbreakable endpoint resilience.
Premiere Global Services (PGi)
Learn how Premiere Global Services (PGi) now have instant access to detailed information about each of their devices.
Rhode Island Blood Center
Learn how the Rhode Island Blood Center protects donor information and locates laptops using Absolute.
Sound Physicians
Learn how Sound Physicians protect sensitive data with Absolute Resilience.
Suffolk Construction
Learn how Suffolk Construction track, manage, and secure site devices with Absolute.
Surrey School District
Learn how Surrey School District uses Absolute to automate processes, saving the IT Department time and money.
Tullow Oil
Learn how Absolute protects Tullow Oil's sensitive data on hundreds of laptops used worldwide.
United States Environmental Protection Agency
Learn how the US Environmental Protection Agency saves money and protects data with Absolute.
Wichita State University
Learn how Wichita State University keeps its device population and data secure, avoiding financial loss and compliance violations.
Data Sheets & Tech Notes
Absolute Resilience: Cyber Catalyst 2020
Learn why Cyber Catalyst chose Absolute Resilience as their designated cybersecurity solution in 2020.
Absolute Automate
Automate tedious workflows, minimize your incident response turnaround, and prime your team for speed and agility with our security automation service.
Absolute Educate
Equip your team with the best security training available. Choose from our training modules or custom-build a program of your own, based on top industry standards and our time-tested methodologies.
Absolute Manage
Bring our expertise in-house with a dedicated Absolute consultant to help manage your perimeter, optimize your strategy, and keep your organization secure.
Absolute Assist
Connect with a dedicated consultant to help you onboard Absolute, customize it for your business, and establish best practices for long-term success.
Web Usage Reporting - Enterprise
The Absolute platform allows you to easily generate Web Usage Reports to know what websites users are actively engaged with, how much and when.
Absolute Upgrade Services
If you're considering an upgrade to Resilience, our experts can help you get value faster, avoid implementation risks, and maximize your return on investment.
Absolute® Reach™
Remotely query insights or take urgent remedial action at-scale using Absolute Reach’s scripting capabilities. Leverage a growing library of pre-built scripts or run your own custom script across your endpoints.
Importance of Maintaining Effective Cybersecurity in Government Offices and Agencies
Datasheet highlighting the challenges in government entities in maintaining an effective security posture
Absolute Onboarding
Jumpstart your journey to endpoint resilience through the Absolute Onboarding program. Get access to the necessary tools and resources to effectively set up and configure your console account to your specific needs.
Device Reclamation Service
Have your student devices gone missing? Absolute allows resource-challenged districts to outsource this time-consuming task to specialists.
Web Usage Reporting - Education
Use new Web & Rising Web Usage Reports to know what websites students are spending their time on, monitor EdTech use, and block potentially unsafe content with web filters.
The Absolute Platform
Achieve true cyber resilience with the only factory-embedded endpoint security solution. Get to know the broad strokes of the platform and its impact.
Absolute for Chromebooks
See how Absolute for Chromebooks helps you protect your students and their mobile computing devices, so you can focus less on security and more on learning.
Absolute Investigations
Learn how Absolute Investigative Services has used cyber forensics to solve crimes and recover devices since 1993.
Application Persistence: Self Heal Your Most Critical Applications
Make your mission-critical applications indestructible with Application Persistence. Maintain a gold image, regardless of network status or device location.
Absolute and Microsoft Bitlocker
See how the patented self-healing abilities of Absolute Persistence can extend to Microsoft BitLocker, automatically repairing critical components while ensuring encryption is active and data is protected.
Absolute Application Persistence Technical Guide
Leverage firmware-embedded Persistence technology to self-heal any mission-critical application and build resilience into the application layer.
Maintaining Microsoft SCCM Health Through Absolute
Learn how Absolute can help maintain the health of SCCM and automatically self-heal to strengthen your environment.
2018 Australia Privacy Amendment
The Privacy Amendment requires many Australian organisations to take steps to mitigate data breaches, with penalties for non-compliance as high as $1.8 million. Learn how Absolute can help.
Absolute: Security & Privacy Overview
Get to know Absolute as a company and a platform. See the broad range of solutions, data, technology, and processes that Absolute uses to protect customers like you.
Absolute Technical Support Specifications
Need help with Absolute? See who you should call and what you can expect for response times based on the severity of your issue.
Daily Data Export
If you've been struggling to keep an accurate asset inventory, you'll be interested in Daily Data Export. Combine Absolute's data with your asset inventory system to get a truly clear picture.
SIEM Technology
Learn how the Absolute platform integrates with and complements a SIEM solution to give you more complete, actionable insights.
Product Security Practices
Our platform wouldn't exist without the trust of our customers and partners. See what steps we take to build and maintain that trust through strict security practices.
Absolute Endpoint Data Discovery
What is Endpoint Data Discovery? How does it work? Get answers to common questions about data visibility within the Absolute platform.
Absolute Enterprise License Agreement
Get detailed information on Absolute‘s streamlined and simplified enterprise license agreements.
Absolute for Chromebooks
Get answers to common questions about our security solution for Google Chromebook devices.
Absolute Persistence
Get answers to common questions about Persistence, the factory-embedded technology that enables unprecedented endpoint security resilience.
Absolute Reach
Understand Reach's power to detect, understand, and remediate vulnerabilities across 100% of your endpoints on-demand, even off the corporate network.
Application Persistence
Get answers to common questions about Application Persistence, the most reliable way to ensure the health of your mission-critical applications.