Absolute Data & Device Security (DDS) is an adaptive endpoint security solution. It provides you with a persistent connection to all of your endpoints and the data they contain.
With Absolute DDS, it’s all about the connection. By maintaining a two-way connection with each device, you have the insight you need to assess risk and apply remote security measures so you can protect each endpoint and the sensitive data it contains.
This valuable insight is delivered through a cloud-based console that requires no additional IT infrastructure.
Persistence works with just about any software agent, triggering an automatic, zero-touch reinstallation if the agent is missing or removed – even if the firmware is flashed, the device is re-imaged, the hard drive is replaced, or if a tablet or smartphone is wiped clean to factory settings.
Track assets on a Google Map™, including recent and historical locations. Create geofences based on corporate policies. Investigate devices that are out of bounds or entering an unauthorized location.
Identify risk conditions and receive a notification if these conditions occur. Key security data integrates automatically with SIEM solutions. Scan for sensitive data on the endpoint and tailor your security response based on the results. Validate the status of complementary security applications such as encryption, anti-malware, and SCCM. Use these reports to prove to auditors that security measures were properly implemented and in place at the time of a security incident.
Collect incredibly accurate information from each device, including historical data. Determine if sensitive data is stored on a device. Identify activities and user behavior that could be precursors to a security incident including changes to IP address, location, unauthorized access to sensitive data, non-compliant software/hardware installations; and many more. Receive a notification if these activities occur.
Program the automatic reinstallation of business critical endpoint software applications. Remotely recover or delete data. Set policies to ensure offline devices are automatically protected. Freeze a device and communicate with the user to verify status. Produce an audit log to prove data on a compromised device was properly secured, not accessed, and safely deleted. Use certified data delete workflows to decommission a device.
Leverage the Absolute Investigations team to determine the cause of an endpoint security incident. Identify and eliminate insider threats. Refine best practices so the same incident does not reoccur. Determine if data was accessed during an incident, and whether or not a data breach notification is required. Recover stolen devices.
Learn how Absolute DDS delivers a full complement of endpoint security features and remote capabilities to control and secure your business data and devices.
Learn how we can help you deploy your Absolute solution with confidence, reduce risk and fast-track your time to value.
IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes. Follow our five steps to foster a conscientious...
The release of a new Microsoft operating system is always an important event for IT departments, and Windows 10 is no exception. Learn about the security implications of migrating to the new platform.
What is Persistence technology?
Learn how Persistence technology enables IT to manage mobility, investigate potential threads, and take action if a security incident occurs.
From small businesses to large enterprises, Absolute provides persistent endpoint security and data risk management solutions so that our customers can confidently enable mobility, investigate...
Enable your organization to fully meet its asset management and security potential.
Receive world-class support to ensure your team remains productive and your organization protected.
Accelerate your product adoption with Absolute Professional Services.