Absolute Data & Device Security (DDS) is an adaptive endpoint security solution powered by Persistence. It provides you with persistent visibility and remediation of all of your endpoints and the data they contain.

With Absolute DDS, it’s all about the connection. By maintaining a two-way connection with each device, you have the insight you need to assess risk and apply remote security measures so you can protect each endpoint and the sensitive data it contains.

This valuable insight is delivered through a cloud-based console that requires no additional IT infrastructure.

New solution

Endpoint Data Discovery

Your users could be anywhere… and so could your data. If your ability to monitor sensitive data is limited to the network, then you’re only getting half the story. Learn More



Persistence works with just about any software agent, triggering an automatic, zero-touch reinstallation if the agent is missing or removed – even if the firmware is flashed, the device is re-imaged, the hard drive is replaced, or if a tablet or smartphone is wiped clean to factory settings.


Track assets on a Google Map™, including recent and historical locations. Create geofences based on corporate policies. Investigate devices that are out of bounds or entering an unauthorized location.

Risk Assessment

Identify risk conditions and receive a notification if these conditions occur. Key security data integrates automatically with SIEM solutions. Scan for sensitive data on the endpoint and tailor your security response based on the results. Validate and monitor the status of complementary security applications such as encryption, anti-malware and SCCM with a visual security dashboard. Use reports to prove to auditors that security measures were properly implemented and in place at the time of a security incident.

Reporting and Analytics

Collect incredibly accurate information from each device, including historical data. Determine if sensitive data is stored on a device. Analyze device usage metrics. Identify activities and user behavior that could be precursors to a security incident including changes to IP address, location, unauthorized access to sensitive data, non-compliant software/hardware installations; and many more. Receive a notification if these activities occur.

Risk Response

Program the automatic reinstallation of business critical endpoint software applications. Remotely recover or delete data. Set policies to ensure offline devices are automatically protected. Freeze a device and communicate with the user to verify status. Produce an audit log to prove data on a compromised device was properly secured, not accessed, and safely deleted. Use certified data delete workflows to decommission a device.

Endpoint Investigations

Leverage the Absolute Investigations team to determine the cause of an endpoint security incident. Identify and eliminate insider threats. Refine best practices so the same incident does not reoccur. Determine if data was accessed during an incident, and whether or not a data breach notification is required. Recover stolen devices.


  • Asset management without realtime capabilities is worth very little. So, I would rank the ability to reach out and manage devices regardless of their physical location with Absolute as a ‘must have’. The role of Absolute is critical in two specific ways: it provides validation to our internal asset management platform and extends access to our computer population when we find them outside of our control.

    Dave Johnson , Director of Strategic Services Director of Strategic Services

    Confidence in endpoint security at Grant Thornton.

    Learn More
  • Absolute offers so many tools we find very valuable. We can now see which software is loaded on a machine to determine if we’re maxing out or underutilizing software licenses. We’ve been able to transfer unused software licenses to users who need them, saving the office or division from buying additional licenses; allowing those monies to be used on other expenditures.

    Walter Williams , Desktop Technical Manager & Information Specialist Desktop Technical Manager & Information Specialist

    US Environmental Protection Agency saves money and protects data with Absolute.

    Learn More
  • Absolute is now a key part of our data security measures because almost every time we've had a laptop stolen or mislaid, it allows us to prevent anyone from accessing the data. For a business like Tullow Oil, this capability is very important.

    Trudie Seeney , Information Systems Asset Manager Information Systems Asset Manager

    Absolute protects sensitive oil and gas exploration data on hundreds of laptops used worldwide.

    Learn More
  • Absolute makes managing laptops much safer and easier. We know immediately if a laptop begins to drift off our radar we can send the department manager a message asking them to investigate. If a device is lost or stolen, Absolute is a lifeline.

    Brad Myrvold , Manager of Desktop Technology Manager of Desktop Technology

    Allina Health prevents data breaches with Absolute.

    Learn More
  • “By improving our tracking capabilities and recovering stolen computers, Absolute easily paid itself off within the first year of its deployment. We’ve cut our annual loss rates by more than half, so are saving tens of thousands a year in hardware costs alone.”

    Nicholas Mazzola , Inventory Management/Logistics Inventory Management/Logistics

    NMR Staging and Events cuts computer loss in half.

    Learn More
  • At Under Armour one of the most important things is Intellectual Property. We use Absolute to protect all of our computers including those in our innovation and design departments.

    Ben Snyder , Desktop Support Analyst Desktop Support Analyst

    Endpoint security is no sweat for Under Armour with Absolute.

    Learn More




Receive world-class support to ensure your team remains productive and your organization protected.


Accelerate your product adoption with Absolute Professional Services.