
At-Risk Data in Cloud Applications
Storage of sensitive corporate data on unauthorized cloud-based applications such as Dropbox, OneDrive, iCloud, and Box, can lead to costly data breaches. By unmasking the use of ‘Shadow IT’ applications, organizations can avoid potential insider threats and take a proactive stance on a security blind spot.
Absolute Corporate Profile
This document contains an overview of Absolute's business, operations, locations, management, analyst coverage, patents, and financials.
Absolute Application Persistence for Dell ESSE and Data Guardian
By leveraging Application Persistence, you can ensure each device has Dell ESSE’s components and Dell Data Guardian installed and running in a healthy state, regardless of network status or device...
Student Technology Analytics
Learn how our Student Technology Analytics solution help you secure funding by measuring utilization, proving positive ROI and demonstrating resource optimization.
2018 Australia Privacy Amendment: What is Changing And How Absolute Helps
In early 2017 Australia passed the Privacy Amendment, giving a large number of federal government agencies and companies 12 months to meet the new requirements. Many Australian organisations are now...
Absolute Security and Privacy Overview
This security and privacy overview document is intended for customers and agencies wishing to evaluate and advise on the use of the Absolute platform. The document provides information about Absolute:...
Absolute Product Security Practices
Absolute is fully committed to providing the most secure software products in the industry. Download this document to learn more.
Customer Success with Absolute Reach
Learn how our customers use Absolute Reach to quickly tackle some of today’s top security threats, including: malware, unpatched devices and critical firmware vulnerabilities.
Absolute Technical Support Specifications
Learn more about our Technical Support organization, support case severity levels and target response times.
SIEM Technology
Learn how the Absolute platform integrates with and complements a SIEM solution; and provides information on the data sent to SIEM by Absolute.
Data Risk Report
Learn how Absolute helps you identify and quantify your risk exposure as a result of at risk data on your endpoints and reduce potential security data breach blind spots.