Absolute for Android
Absolute for Android is a self-healing endpoint security solution for smartphones and tablets. It provides you with a persistent connection to all of your endpoints to secure devices and the sensitive data they contain.
Learn how Absolute complements device management solutions by focusing on securing both the device and your sensitive data.
Detailed matrix showing Absolute DDS features and the Operating Systems that are supported.
Learn how to promote student and community safety, deter criminals and protect your school’s technology investment with Absolute Safe Schools.
Lean how our Endpoint Data Discovery (EDD) tool helps you identify at-risk data by scanning endpoints for sensitive data. You can choose to target a device or scan your entire device deployment, on or...
Learn how Absolute for Chromebooks helps you protect your students and their mobile computing devices, enabling you to put the focus back on learning.
By leveraging Application Persistence, you can ensure each device has the proper applications installed regardless of network status or device location.
Learn how Absolute DDS delivers a full complement of endpoint security features and remote capabilities to control and secure your business data and devices.
Learn how Absolute for iPads can help you safeguard the iPad devices in your deployment.
Designed for existing Absolute DDS customers, the Health Check service provides you with tailored, actionable recommendations that improve your security posture and reduce endpoint security risks.
Absolute Security Assessment is designed to provide a point-in-time assessment of the security posture of your workstations, providing you critical insight into existing threats and security...
Our Implementation Services are designed to help you deploy your Absolute solution with confidence, fast-track your time to value, and reduce implementation risk. You can be confident your deployment...
Learn how Healthcare Endpoint Investigations services, delivered by the Absolute Investigations team, can help you identify when, and if, a breach notification should occur.
Absolute has been investigating and helping to solve endpoint and computer crime since 1993. Supported by Persistence technology and the Absolute Forensic Tool set, the Absolute Investigations team...