Contact Us

See why organizations of all industries — and all sizes — rely on Absolute and our patented Persistence technology.

1 877 600 2295


Product Demo

You’re always informed and in control, even if a device is off the network or in the wrong hands.

View Demo

Free Trial

Activate your 30-day free trial with full product functionality today.

Download Trial

Build Resilient Self-Healing Endpoint Applications With The Unstoppable Power Of Persistence

You’ve invested in endpoint controls to protect your most critical device and data assets, but that requires full application availability and integrity to be effective. Unfortunately, once deployed, devices get re-imaged, malware disables applications, and registry files become corrupted — not to mention the impact of negligent or malicious users.

Critical applications such as VPN, antivirus, encryption, systems management and other controls that have historically been too easily compromised, have left you flying blind until now.

Application Persistence

Application Persistence by Absolute provides your applications with unique self-healing capabilities, even if your device is off the corporate network or outside your domain of control.

Download Whitepaper Watch Video

If an application is removed, disabled, or tampered with, Application Persistence initiates an automatic, zero-touch reinstallation so you can proactively eliminate vulnerabilities. That’s because Application Persistence makes Absolute’s unique embedded position in over one billion endpoints open to third-party endpoint agents to build endpoint applications that will survive attempts to disable them — even if the device is reimaged, the hard drive is replaced or the firmware is flashed.

Only Application Persistence gives you the deep insight and control you need to meet compliance audits, showing that critical applications were in place and functioning during a security incident.

Key Features

Encryption is a powerful data protection tool, but can be easily compromised by users and attackers. Application Persistence ensures your encryption solutions remain on, available, and effective — at all times.

Malware infections often attempt to remove anti-malware and anti-virus products. Application Persistence detects attempts to un-install, restoring these solutions for ongoing protection. It can also be used to deploy and standardize anti-malware or anti-virus solutions, even if the device is off-network.

You’ve invested significant resources in endpoint protection solutions. Application Persistence adds an additional layer of resiliency to these products by ensuring the solution is always-on, always-available regardless of endpoint status.

Malicious insiders will often attempt to disable or remove DLP tools in the hopes they can abscond with your critical data. Application Persistence can make sure that your solutions cannot be removed and your sensitive data remains protected.

The vast majority of enterprises today require their mobile or remote workers to connect to internal resources through a VPN. Application Persistence can ensure your VPN clients remain available and resilient, ensuring your mobile workforce can always connect, and your organization remains protected.

Robust systems management tools are key to ensuring you can manage and patch every endpoint. Application Persistence provides IT administrators with the confidence that their asset management applications are functional so they can see and control every device, anytime, anywhere.


Enterprises and ISVs around the world rely on Application Persistence for set it and forget it resiliency to:

Self-Heal Endpoint Applications

Ensure critical endpoint applications are always available and effective.

Proactively Minimize Risks

Keep critical applications on devices, minimizing security risks. Restore security posture across all endpoints.

Automatically Repair Breaches

Spot and remediate issues in near real-time. Maintain compliance, even if devices or data are off the network.

Ensure Compliance

Easily maintain correct application versions and meet compliance requirements.

Extend Application Visibility

Off-network devices remain visible with existing tools. Organizations can connect with a device regardless of user or location.

Deploy Instantly

Absolute’s Persistence technology is already embedded in popular PCs and mobile device. You simply activate it via our cloud-based platform for fast results.

Read the latest Technology Spotlight from the researchers at IDC to learn how Absolute’s embedded security solutions can help you gain total visibility and control of your data, your devices, your applications and your users through the power of embedded persistence.

Download Report