
Recommended:
Experts discuss assessment, remediation, and recovery to easily resume operations after a ransomware attack.
Research Reports
2022 Gartner® Market Guide for Zero Trust Network Access
The Gartner Market Guide for Zero Trust Network Access provides essential background and recommendations for the changing landscape, and highlights some of the biggest security risks facing organizations today.
21/22 Endpoint Risk Report | Education Edition
Explore the latest trends in K-12 device usage and management, from Absolute’s annual study of over 10,000 schools and districts.
2021 Endpoint Risk Report
Discover four key trends from nearly 5 million Absolute-enabled endpoints and see what enterprises are doing to minimize endpoint risk.
Take A Proactive Approach To Endpoint Security
A new Forrester survey of leading IT and security professionals reveals that endpoint resilience has become essential as workforce dynamics change.
The Third Question: What CISOs Aren't Asking, and What's at Stake
Discover what critical question CISOs are failing to ask and why it’s leaving organizations open to risk, with advice and insight from four of the world’s top cybersecurity innovators.
Whitepapers & eBooks
Two Options for Application Hardening and Resilience
Learn about application self-healing through Absolute Application Persistence and how it benefits software vendors when compared to other hardening methods.
5 Cybersecurity Practices Every K-12 District Should Follow
Cyberattacks against K-12 school systems are on the rise. Yet, many school systems still lack even basic cybersecurity policies and controls that could protect them from an attack.
How to Boost Resilience Against Ransomware Attacks
Discover what tactics, techniques, and procedures threat actors apply in their ransomware attacks and how to take basic steps to increase cyber resilience.
Year-End Inventory and Device Collection Handbook
This guide takes you through our recommended approach to device collections, incorporating both communication and technology guidelines to seamlessly reclaim your district’s devices.
G2 2022 Spring Report - Endpoint Management Software
Which endpoint management tools do your peers recommend? Secure your data and devices with a G2 leader.
The Third Question: What CISOs Aren't Asking, and What's at Stake
Discover what critical question CISOs are failing to ask and why it’s leaving organizations open to risk, with advice and insight from four of the world’s top cybersecurity innovators.
Secure Federal Data and Support Your Mobile Workforce
Federal IT must support a large user base increasingly working from home where they take their devices—and the Federal data they contain—with them.
Securing and Enabling Your Remote Workforce
As organizations adapt to — and even embrace — remote work, enabling productivity without sacrificing security is more important than ever. Here are five steps to help you along the way.
Absolute Persistence
Get to know Persistence, the only technology that keeps you in complete command with a self-healing, two-way connection to any endpoint or application — even off your network.
Achieving HIPAA Compliance
Identify authorized and unauthorized devices on your network, ensure optimal security configurations, and conduct HIPAA & HITECH risk assessments with Absolute.
Complying with GDPR: What All Organizations Need to Know
Prepare for audits and verify compliance with GDPR, so you can increase customer trust and avoid devastating fines.
Data Breach Prevention for Healthcare
Of the many pressures on healthcare organizations — quality, efficiency, affordability, and more — patient information security is often overlooked. Take these steps to prevent costly breaches.
Effective Healthcare Data Breach Response
Healthcare IT departments aren't just battling regulatory transformation — they're fighting off cybercriminals. Follow these six steps to mitigate the damage of a potential security incident.
How to Provide a Safe Learning Environment
Use Absolute to enact comprehensive security and awareness programs that will increase IT efficiency and foster a safe environment for students and staff.
NIST Cybersecurity Framework Implementation
Use these clear guidelines to implement the NIST's cybersecurity framework within your own organization.
The Cost of a Data Breach in Healthcare
New data protection regulations have increased the risk of fines and settlement fees. Learn how to avoid a costly data breach and embrace the digital healthcare revolution.
Implementing the NIST Cybersecurity Framework for Government
Calling all CIOs and CISOs in government! Optimize your approach to security and management with this practical guide, so you can safely get all the benefits of a distributed workforce.
Application Persistence
Get the details on Application Persistence, Absolute's one-of-a-kind platform that offers unstoppable reporting and remediation to any app that runs on Windows 7 or higher.
Data Breach Prevention - Back to basics with IT security best practices
You've acquired plenty of tools to prevent data breaches — but is your organization doing the little things right? Take these steps to ensure you're optimizing for breach prevention.
3 Overlooked Data Privacy Considerations
We live in a dematerialized world, which makes data privacy more important than ever. Learn what's at stake for your organization and plan your next steps.
Data Breach Response Revisited
Your data is valuable, which means it's attractive to cybercriminals. Understand what's at stake, how to deter breaches, and how to respond when one occurs.
Solution Sheets
ApaaS Solution Brief
Learn about the benefits of joining the Absolute Application Persistence ecosystem and how resilience assures the integrity of your applications.
Absolute for Energy and Utilities
As the energy industry becomes more complex and distributed, it's more crucial than ever to see and protect all your endpoints. Learn how Absolute can help.
Absolute for Financial Services
Meet internal and regulatory requirements for data security on all your devices with Absolute's powerful suite of tools.
Absolute for GDPR Compliance
Stay audit-ready with our practical guide to GDPR – and be completely ready with Absolute's always-on visibility, control, and resilience.
Absolute for Government
Leverage Absolute to enable a secure digital government, and increase your IT and security efficiency, accuracy and confidence. Stay compliant on all your endpoints.
Absolute for Higher Education
Colleges and universities need to square their need for information with compliance risks and cybersecurity threats. Strike the balance with Absolute's endpoint visibility and control.
Absolute for K-12 Education
See, manage, control and validate appropriate usage across your entire device population — whether they're Chromebook, Windows, or Mac devices.
Absolute for Legal Services
Law firms are trusted with some of their clients' most sensitive data. Protect it — and your IT assets — with Absolute's unprecedented endpoint visibility and control.
Absolute for Healthcare
Learn how Absolute gives you the power to identify potential security threats and respond rapidly before they become security incidents that require breach notifications.
Absolute for IT Asset Management
Remote workforces and BYOD programs have added layers of complexity to IT asset management. Use Absolute to prove compliance, reduce asset losses, and drive efficiencies.
Evaluation Guides
NIST Cybersecurity Framework Evaluation Guide
Discover how Absolute helps organizations implement best practices across their endpoints as outlined in the NIST Cybersecurity Framework.
CIS Critical Security Controls Evaluation Guide
Defend your organization better by prioritizing and implementing the best practices recommended by the Center for Internet Security.
CJIS Security Policy Evaluation Guide
Want access to CJIS systems and information? You'll need to meet their benchmarks for endpoint security. Do it quickly with Absolute.
HIPAA Compliance Evaluation Guide
Use this comprehensive checklist to assess your organization's data security. See how Absolute can help you attain and maintain HIPAA compliance.
HITECH Compliance Evaluation Guide
Achieve HITECH compliance across your endpoint population with this comprehensive checklist. And do it faster with Absolute.
Infographics
How to Boost Resilience Against Ransomware Attacks
Learn the anatomy of ransomware attacks and what basic steps to take to increase cyber resilience
Distance Learning's Impact on Education IT
Learn the new priorities for education IT from the definitive report on K-12 endpoint health. Get key insights on device usage, security and more as schools adapt to remote and hybrid learning.
5 Steps to Adapt your Devices to Online Learning
Follows these steps to ensure safe and secure remote learning
6 Steps to Effective Data Breach Response
Follow these steps to respond to any breaches involving sensitive healthcare data.
Nailing It! How to Win with the NIST Cybersecurity Framework
See how you stack up against other organizations in implementing the five pillars of the NIST Cybersecurity Framework: Identify, Protect, Detect, Respond, and Recover.
Protecting PHI in 7 Steps
Healthcare is data. Take these specific and practical steps for secure digital care and data protection across all your devices, no matter where they are.
Product Videos

Absolute for Chromebooks
Absolute enhances the Google Admin Console, extending its capabilities with comprehensive intelligence and control. Everything you need is at your fingertips: insights into device health, user behavior metrics, plus the ability to monitor, control, and protect student devices from a single console, on- or off-network.

Automate Endpoint Management Tasks Remotely
See how Absolute Reach lets you automate and extend your IT capabilities off-network. Remotely gather information and perform critical actions like setting admin passwords and installing or uninstalling applications.

Fix Endpoint Vulnerabilities and Enforce Operating System Updates
Learn how Absolute Reach helps you automate and expand your IT capabilities, so you can respond efficiently to vulnerabilities and act quickly to protect your users, devices, and data - even off-network.

Absolute Core Editions
High level overview of Absolute's 3 core editions: Visibility, Control and Resilience. We briefly discuss a few of the main features in each edition and go over how each edition builds on the other.

Introduction to Absolute Software
Welcome to Absolute, the industry standard for device visibility and resilience. This video explains who Absolute is and how our self-healing technology protects your PC, and the data that's on it, no matter where it is or who has it.
Webinars
The Reality of Ransomware Attacks
It’s not a matter of if but when your company will be affected. Our panel will discuss more efficient and quicker ways to resume operations impacted using Absolute Ransomware Response.
Endpoint Resilience As A Proactive Security Strategy
Please join Absolute and guest Forrester for a 45-minute critical discussion on our new commissioned report "Take A Proactive Approach To Endpoint Security"
The Third Question: What CISOs Aren't Asking, and What's at Stake
Join innovator and former CISO of Citi, JP Morgan, and Deutsche Bank, Charles Blauner, for a fireside chat with Absolute’s CEO, Christy Wyatt, as they explore managing complexity amidst the ever-evolving threat landscape.
Application Persistence: How to Secure Your Security
Understand the value of leveraging Application Persistence, how to enable, configure and activate it for your critical applications and reporting on application health and compliance.
Distance Learning’s Impact on Education IT
Get the data and key insights required to successfully meet the new realities facing IT in K-12 education.
Standardize your compliance reporting and control your remote devices
Our product experts will demonstrate the intelligence and tools you can use to manage devices with at-risk data — anytime and from anywhere.
K-12 Peer Advice Forum: What’s Working for IT and Security Teams
Success stories from the front lines of the remote learning transition. This first K-12 Peer Advice session features Eric Ramos, CTO of California’s Duarte School District.
The State of Endpoint Resilience in 2020 – A Critical Discussion featuring Forrester
Absolute and featured guest Forrester, reveal key trends impacting endpoint health, fragility, and complexity – and the unexpected challenges introduced by remote work and distance learning.
3 Essential Actions to Manage and Secure Remote Devices
Ensure continuity for your IT and security processes with Absolute's remote device actions. Learn how to protect your organization's data and secure devices with 3 critical features: Device Freeze, Device Wipe and Data Delete.
3 Immediate Actions to Save Time While Managing Online Learning
Learn to use the new Web Usage reporting to pinpoint exactly where, and for how long, students spend their time online. Gain best practices for device collection, as well as effectively operating a remote helpdesk to support students and staff.
Product Briefing: Critical Steps to Secure and Manage Your Remote Workforce
Workforces across the globe are going remote. These valuable and practical tactics will help you optimize your endpoints and Absolute console for security and productivity — no matter where your end users are.
Five Easy Ways to Transform Your Absolute Account
Many different factors influence the health of your endpoints. This 45-minute power session will help you maximize your account health as we share easy-to-implement tips.
Effective Asset Lifecycle Management
From initial deployment to the eventual end-of-life process, find out how to use Absolute to its fullest in order to maintain the integrity and maximize the value of your devices.
Five Steps to Safeguarding Your Digital District
School-provided devices are proliferating. Application management is increasingly complex. And students are more digitally savvy than ever. The result? Schools are more vulnerable than ever before. But we have solutions for you.
Tracking and Recovering Missing Devices
Get a rundown of Absolute's tools for managing your lost or stolen devices. Learn where they are, who’s using them, and how to locate them with the Absolute console.
Nailing It! 5 Ways to Win with the NIST Cybersecurity Framework
See how you stack up against other organizations in implementing the five pillars of the NIST Cybersecurity Framework: Identify, Protect, Detect, Respond, and Recover.
7 Steps to Protecting Data in the Era of Digital Care
Healthcare is data. Take these specific and practical steps for secure digital care and data protection across all your devices, no matter where they are.
5 Essentials for Securing and Managing Windows 10
This one-hour investment will pay dividends, whether you're planning on migrating or already have. Learn how to deploy and utilize the many security enhancements in Win10 — without the pitfalls.
Cyber Threat Checklist: Are You Prepared?
The most effective way to handle a cybersecurity incident? Keep it from happening in the first place. Protecting your organizations valuable data starts with a solid cybersecurity strategy for preventing both insider and external threats.
Customer Videos

Anaheim Union High School District
Learn how the Anaheim Union High School District uses Absolute to manage and secure tens of thousands of Chromebook, Mac, and PC devices.

Apria Healthcare
Learn how Apria uses Absolute to secure, control, and manage over 8,000 remoted devices, protecting PHI for millions of patients.

Asplundh Tree Expert
Asplundh has a highly-mobile workforce and thousands of distributed endpoints. Learn how they keep constant visibility and control over their devices with Absolute.

Cook County Sheriff's Office
See how the Cook County Sheriff’s Office uses Absolute to control their endpoints, maintain transparency, and gain valuable insights on device usage.

Greenville Health System
With 7 hospitals and over 15,000 employees, Greenville Health System is responsible for an ocean of PHI. See how they’ve secured it with Absolute.

Santa Margarita Catholic High School
See how Absolute helps Santa Margarita enable a secure and effective 1-1 device program.
Case Studies
Allegis Group
Learn how Absolute Application Persistence delivers reliability to Allegis Group.
Allina Health
Learn how Allina Health prevents costly data breaches with Absolute.
Anaheim Union High School District
Anaheim Union HSD decreases device theft with comprehensive fleet visibility and control and increased device tracking accuracy.
Apria Health
Learn how Apria Healthcare delivers enriched patient care with Absolute.
Asplundh
Learn how by activating Absolute on their endpoints and incorporating Absolute into their standard device image, Asplundh gained uncompromised visibility of its entire device fleet.
Baltimore City Public School System
Learn how Baltimore City Public Schools delivers secure technology to the classroom.
Bovis Homes
Bovis Homes had a problem with missing endpoints. Due to the large number of temporary employees working remotely, devices often went rogue. They faced GDPR risks as well. See how Absolute helped them overcome these issues.
Caresource PHI
Learn how CareSource is protected and compliant with the Health Insurance Portability and Accountability Act (HIPAA).
Cayman Islands Ministry of Education
Learn how Absolute helps the Ministry retrieve stolen devices and deter future thefts.
Centre Hospitalier Universitaire
Learn why the computers that CHU de Clermont-Ferrand purchases now come pre-loaded with Absolute.
Dorset & Wiltshire Fire and Rescue Service
Dorset & Wiltshire Fire and Rescue Service Tracking, repairing and recovering devices while ensuring tamper-proof security of sensitive information are critical capabilities to the DWFRS. See how they secure and persist all of their mobile devices with Absolute.
Duarte Unified School District
See why Duarte Unified School District selected Absolute’s Web Usage to enable them to stand up, monitor, manage and measure their distance learning programs amidst the COVID-19 outbreak.
Emergency Communications of Southern Oregon
Learn how Absolute helps ECSO ensure compliance with the CJIS Security Policy and save lives in the field.
Euromonitor
Learn how Euromonitor secures proprietary market research with Absolute.
Fresno Unified School District
Learn how Fresno Unified School District manages and secures 100,000 device fleet with Absolute Resilience®
Greenville Health System
Learn how Greenville has been steadily growing their relationship with Absolute and currently has their solution installed on 14,000 devices with plans to add more.
Indiana Charter School Network and Goodwill Industries
Learn how Goodwill Industries with Indiana Charter School Network deterred theft, ensured network compliance, and monitored their inventory with Absolute.
KCOM
Learn how KCOM ensures compliance with the GDPR regulation, strengthens its security posture, and increases operational efficiency with Absolute.
Los Angeles Tourism & Convention Board
Learn how the Los Angeles Tourism & Convention Board manages and protects their global workforce's devices and data with Absolute.
Loudoun County Public Schools
Learn how Absolute enables personalized learning at Loudoun County Public Schools by minimizing risk and increasing device utility.
Ogletree Deakins
Ogletree Deakins has made data security one of the pillars of their technology implementation. See how they use Absolute to secure their sensitive data, comply with regulations such as GDPR or HIPAA and reinforce active encryption and anti-malware.
PA Cyber
A pioneer in remote learning, PA Cyber relies on Absolute for unbreakable endpoint resilience.
Rhode Island Blood Center
Learn how the Rhode Island Blood Center protects donor information and locates laptops using Absolute.
Sound Physicians
Learn how Sound Physicians protect sensitive data with Absolute Resilience.
Suffolk Construction
Learn how Suffolk Construction track, manage, and secure site devices with Absolute.
Surrey School District
Learn how Surrey School District uses Absolute to automate processes, saving the IT Department time and money.
Tullow Oil
Learn how Absolute protects Tullow Oil's sensitive data on hundreds of laptops used worldwide.
United States Environmental Protection Agency
Learn how the US Environmental Protection Agency saves money and protects data with Absolute.
Data Sheets & Tech Notes
Absolute Ransomware Response
Absolute Ransomware Response empowers organizations to assess their ransomware preparedness for endpoints, monitor their endpoint cyber hygiene across the entire device fleet, and allow for an expedited ransomware endpoint recovery.
Absolute Insights for Endpoints
Absolute Insights for Endpoints enables organizations to analyze historical IT and Security trends across their endpoint environment via customizable dashboards, filters and targeted queries to identify and resolve anomalies.
Resilience for Student Devices Solution Sheet
Absolute Resilience for Student Devices. With device visibility and control capabilities as well as an annual missing device collection service, school districts ensure device fleets are managed and protected all year long, use of federal funding for mandated 1:1 programs is accounted for, and device loss is reduced.
Absolute Device Wipe
Absolute Device Wipe enables organizations to wipe encrypted drives while adhering with NIST media sanitization guidelines. Ensure devices are securely sanitized for decommissioning purposes or to protect sensitive data.
Absolute DataExplorer
Absolute DataExplorer enables organizations to align device reporting to their specific business needs. Define and configure custom datapoints to be captured across your devices or choose to activate default datapoints available through the Absolute console.
Absolute Resilience: Cyber Catalyst 2020
Learn why Cyber Catalyst chose Absolute Resilience as their designated cybersecurity solution in 2020.
Absolute Automate
Automate tedious workflows, minimize your incident response turnaround, and prime your team for speed and agility with our security automation service.
Absolute Educate
Equip your team with the best security training available. Choose from our training modules or custom-build a program of your own, based on top industry standards and our time-tested methodologies.
Absolute Manage
Bring our expertise in-house with a dedicated Absolute consultant to help manage your perimeter, optimize your strategy, and keep your organization secure.
Absolute Assist
Connect with a dedicated consultant to help you onboard Absolute, customize it for your business, and establish best practices for long-term success.
Web Usage Reporting - Enterprise
The Absolute platform allows you to easily generate Web Usage Reports to know what websites users are actively engaged with, how much and when.
Absolute Upgrade Services
If you're considering an upgrade to Resilience, our experts can help you get value faster, avoid implementation risks, and maximize your return on investment.
Absolute Remediate
Remotely query insights or take urgent remedial action at-scale through Absolute Remediate. Leverage a pre-built library or run your own custom script across your endpoints.
Importance of Maintaining Effective Cybersecurity in Government Offices and Agencies
Datasheet highlighting the challenges in government entities in maintaining an effective security posture
Absolute Onboarding
Jumpstart your journey to endpoint resilience through the Absolute Onboarding program. Get access to the necessary tools and resources to effectively set up and configure your console account to your specific needs.
Device Reclamation Service
Have your student devices gone missing? Absolute allows resource-challenged districts to outsource this time-consuming task to specialists.
Web Usage Reporting - Education
Use new Web & Rising Web Usage Reports to know what websites students are spending their time on, monitor EdTech use, and block potentially unsafe content with web filters.
The Absolute Platform
Achieve true cyber resilience with the only factory-embedded endpoint security solution. Get to know the broad strokes of the platform and its impact.
Absolute for Chromebooks
See how Absolute for Chromebooks helps you protect your students and their mobile computing devices, so you can focus less on security and more on learning.
Absolute Investigations
Learn how Absolute Investigative Services has used cyber forensics to solve crimes and recover devices since 1993.
Application Persistence: Self Heal Your Most Critical Applications
Make your mission-critical applications indestructible with Application Persistence. Maintain a gold image, regardless of network status or device location.
Absolute and Microsoft Bitlocker
See how the patented self-healing abilities of Absolute Persistence can extend to Microsoft BitLocker, automatically repairing critical components while ensuring encryption is active and data is protected.
Absolute Application Persistence Technical Guide
Leverage firmware-embedded Persistence technology to self-heal any mission-critical application and build resilience into the application layer.
Maintaining Microsoft SCCM Health Through Absolute
Learn how Absolute can help maintain the health of SCCM and automatically self-heal to strengthen your environment.
2018 Australia Privacy Amendment
The Privacy Amendment requires many Australian organisations to take steps to mitigate data breaches, with penalties for non-compliance as high as $1.8 million. Learn how Absolute can help.
Absolute: Security & Privacy Overview
Get to know Absolute as a company and a platform. See the broad range of solutions, data, technology, and processes that Absolute uses to protect customers like you.
Absolute Technical Support Specifications
Need help with Absolute? See who you should call and what you can expect for response times based on the severity of your issue.
Daily Data Export
If you've been struggling to keep an accurate asset inventory, you'll be interested in Daily Data Export. Combine Absolute's data with your asset inventory system to get a truly clear picture.
SIEM Technology
Learn how the Absolute platform integrates with and complements a SIEM solution to give you more complete, actionable insights.
Product Security Practices
Our platform wouldn't exist without the trust of our customers and partners. See what steps we take to build and maintain that trust through strict security practices.
Absolute Insights for Endpoints
Get answers to commonly asked questions about Absolute Insights for Endpoints, which empowers practitioners with historical asset management and security trends across their endpoint fleet via customizable dashboards and filters and targeted querying capabilities.
Absolute Endpoint Data Discovery
What is Endpoint Data Discovery? How does it work? Get answers to common questions about data visibility within the Absolute platform.
Absolute Enterprise License Agreement
Get detailed information on Absolute‘s streamlined and simplified enterprise license agreements.
Absolute for Chromebooks
Get answers to common questions about our security solution for Google Chromebook devices.
Absolute Persistence
Get answers to common questions about Persistence, the factory-embedded technology that enables unprecedented endpoint security resilience.
Absolute Reach
Understand Reach's power to detect, understand, and remediate vulnerabilities across 100% of your endpoints on-demand, even off the corporate network.
Application Persistence
Get answers to common questions about Application Persistence, the most reliable way to ensure the health of your mission-critical applications.