Secure Endpoint

Secure Access

Absolute Persistence

A core component of the Absolute Platform – leveraging its privileged position in the firmware of more than 600 million endpoints


Unique, patented technology

Absolute Persistence® technology is already embedded in over 600 million devices as a result of Absolute’s partnership with close to 30 international system manufacturers. Once activated, this technology is fiercely resilient and is the only security solution that will survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.

No other technology can do this.

Absolute Persistence

Thanks to Absolute’s unique position in the device firmware, it can guarantee the health of that stream of data and your mission-critical apps.

If anything is missing or disabled, Absolute reinstalls it. Even if the device has been re-imaged or if the hard drive has been swapped out. Your endpoint visibility, control, and critical are truly persistent with Absolute.

What is Absolute Persistence®?


For over 25 years, Absolute has led the way with Persistence®: the only technology that enables firmware-embedded endpoint resilience. Absolute Persistence is already embedded in the devices made by the world’s leading system manufacturers before they leave the factory.


Check device compatibility

Highlights

Unprecedented Visibility

See all your devices, all the time, from a cloud-based dashboard that alerts you when risks appear. This allows you to streamline your device lifecycle management. Know where all your sensitive data lives, allowing you to identify at-risk devices. React to issues before they impact your end users, improving helpdesk efficiency.

Unprecedented Control

Respond to endpoint risks by having always-on connectivity to the endpoint, even if the device has been compromised. Enforce security standards and strengthen your compliance posture.

Are your endpoints compatible?

Absolute Persistence is already embedded in the devices made by the world’s leading system manufacturers before they leave the factory. But if you need more clarity, check out if your device models are supported.


Check Compatibility

Absolute Persistence forms an unbreakable, two-way connection that heals itself, enabling unprecedented endpoint intelligence

Applications can heal themselves with Application Resilience

The same BIOS-embedded Persistence can be extended to any application that runs on the same devices as Absolute. No matter who you are, if you rely on a suite of apps, Application Resilience means peace of mind for you and your organization.


Learn About Application Resilience

Learn about Application Persistence-as-a-Service for ISVs

What our customers love about Absolute

“We are amazed at their Persistence technology. An IT team member took a hard drive out and put it on another machine. The Absolute software client created itself on the new machine and the old machine with a new hard drive. Indestructible.”

David Reynolds - Systems Manager, IT

Rhode Island Blood Center

Absolute Persistence FAQ

Absolute Persistence® is unique, patented technology embedded in the firmware of 600+ million devices that provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint. The Persistence technology is installed in the firmware of most endpoint devices at the factory. Each device leaves the factory with the Persistence technology in place, waiting to be activated. Activation occurs when a customer purchases an Absolute product that supports Persistence and installs the necessary software agent.

Persistence technology is factory-embedded into the core of most endpoint devices. Once activated, it gives you unrivalled visibility and control to confidently manage your endpoints, protect at-risk data, as well as investigate and remediate potential threats. Persistence is the only firmware-embedded solution that will survive attempts to disable it, even if the device is reimaged, the hard drive is replaced, or the firmware is updated.

Through our partnership with system manufacturers, the Persistence technology is embedded in the firmware of endpoint devices at the factory. Persistence leverages Absolute’s secure channel from the cloud-based console down to the firmware. In doing so, it maintains an always-on digital tether between device and Absolute Console, ensuring two-way communication so you can reliably query information and run actions remotely.

Persistence technology remains dormant in the firmware until the Absolute Agent is installed. Once the Absolute Agent is installed, it initiates a call to the Absolute Platform and Persistence is then activated. This means that the status of the software agent is monitored and if it is missing, a reinstallation will automatically occur.

All Absolute products support Persistence technology. The software agent is installed on computers in the operating system by running an installer or when the device is imaged. The software agent sends information from each device to the Absolute Platform for IT administrators and security professionals to assess risks and to take appropriate action.

The Absolute Agent makes regularly scheduled calls over the Internet to the Absolute Platform, where customers access their account via the cloud-based Absolute Console. Telemetry collected includes device, data, application, and user information. Customers can define conditions and receive alerts if the conditions occur, allowing them to respond immediately to any potential security incident. The software agent also supports remote actions such as the running of scripts through Absolute Reach™ and self-healing of critical security applications through Application Resilience™.

No. If the Persistence technology has been enabled, the self-healing capability will repair the Absolute Agent, or any other applications supported by Application Resilience™. The computer will still be protected. The enable/disable state of the Persistence technology is stored in a part of the BIOS that cannot be flashed to remove it.

The communication between the software agent and the Absolute Platform is encrypted. Optionally, you can also enable FIPS-140 certified communication. The Federal Information Processing Standard (FIPS) Publication 140-2 is a US government security standard that specifies the security requirements for cryptographic modules protecting sensitive information. The National Institutes of Standards and Technology (NIST) publishes the list of vendors with validated FIPS 140-1 and 140-2 cryptographic modules. The Absolute Encryption Engine is validated FIPS 140-2.

G2 names Absolute a Leader in Endpoint Management

G2 Leader Mid-Market Winter 2024 G2 Crowd Leader Winter 2024 G2 Momemtum Leader Winter 2024 G2 Leader Enterprise Winter 2024 G2 Leader Americas Winter 2024 G2 Users Love Us

Hear from your peers in the G2 Winter 2024 Report for Endpoint Management.

Download the Report

Take action and learn more

Want to learn more about APaaS for your organization?

If you’d like to make a specific application self-healing and resilient, we can create a custom solution. Contact us to see what Absolute can do for you.

Like what you're hearing?

We’d love to show you how Absolute can secure and empower your organization.

Financial Services