Absolute Security Rehydrate Remotely Restores Compromised Endpoints at Scale in Minutes, Stopping Downtime Caused by Cyberattacks, Ransomware, and Software Incidents

September 17, 2025

Powered by the Absolute Resilience Platform, Embedded in the Firmware of more than 600 Million Windows PCs, this Industry-First Innovation Enables Organizations to Perform Remote, Single-Click Restoration for any Connected Windows PC 

SEATTLE & LAS VEGAS (Fal.Con 2025)Absolute Security, a leader in enterprise cyber resilience, today announced general availability of Rehydrate. Enterprises with business operations that have been stopped by Windows PCs made inoperable by cyberattacks, ransomware strikes, and IT incidents can use this industry-first innovation to automate the at-scale restoration of connected devices to a fully operational state, typically in 30 minutes or lessremotely and with a single click. 

"Ransomware attacks, security breaches, and software failures are now a routine part of doing business. Resilient organizations are prepared for this new reality and have built-in the ability to rapidly recover and maintain operations without missing a beat when inevitable disruptions occur,” said John Herrema, Chief Product Officer, Absolute Security. “With Rehydrate, we're helping to make this possible by enabling companies to restore compromised endpoints within minutes, stopping downtime and eliminating costs that traditionally follow cyber incidents." 

Rehydrate is powered by the Absolute Resilience platform, embedded in the firmware of more than 600 million Windows PCs through OEM partnerships with more than 28 of the world’s leading device manufacturers. This nearly ubiquitous availability makes it easy for customers to quickly deploy the platform across their Windows 10 and Windows 11 device fleets and activate Rehydrate to enable the immediate restoration of compromised devices at scale. Absolute Security’s unique position in the firmware allows Rehydrate to restore affected devices even when the device OS and other security or management tools have crashed, been compromised, become corrupted, or made inaccessible due to a ransomware infection. 

Now generally available in the Absolute Secure Endpoint solution, Rehydrate delivers:

  • Near instant business continuity endpoint restoration through a fully remote, single-click process. When your remote, mobile, and hybrid Windows PCs go down, recovery playbooks ranging from targeted remediations to full OS recovery can be executed across connected devices at enterprise scale.
  • Fast return to a secure and compliant state across device fleets. After your organization has recovered from a disruption to its business, Rehydrate will automate the reinstallation of critical security controls, in minutes, helping to ensure that valuable and sensitive on-premises, cloud, and device data is defended against threats and protected against risk.
  • Seamless delivery, giving stretched IT and security teams a solution that recovers endpoints remotely, rapidly, and at mass-scale to stop downtime. Full integration into the Absolute Resilience platform and Secure Endpoint product lines, including Absolute Secure Endpoint Resilience, Resilience for Automation, and Resilience for Security editions enables fast and easy deployment, direct from the Absolute Security management console.
  • WiFi and Ethernet support capabilities, making it easy for remote, hybrid, and mobile employees to connect their compromised devices for rapid restoration—eliminating the need to return devices to IT and security locations for repair.
  • Strengthened device authentication, aligned with modern security standards, further secures the recovery process through integrated support for the Trusted Platform Module (TPM).

"In the event of ransomware, malware, or system crashes, Absolute Rehydrate enables our company to quickly return devices to a trusted state. This rapid recovery mechanism is crucial for maintaining business continuity and minimizing the impact of cyber incidents. It also supports proactive disaster recovery planning, ensuring that endpoint restoration is not dependent on a functioning OS or network tools," said a Global Enterprise Technology Industry Customer

“Cybercrime and software failures cause disruptions that cost organizations more than a trillion dollars in losses annually,” said Jarad Carleton, Global Market Research Director for Cybersecurity, Frost & Sullivan. “CISOs are increasingly being called on to help ensure their organizations can achieve the level of resilience needed to quickly restore their operations before downtime creates a financial catastrophe. Forward-thinking leaders are adopting solutions and strategies that prioritize operational continuity into every layer of their digital infrastructure—from the endpoint to the cloud.” 

Visit Absolute Security at Fal.Con 2025, Las Vegas, Booth 2108, MGM Grand, for a Rehydrate Demo and to Learn More about how we Stop Downtime. Discover more and schedule a meeting in advance to receive a complementary gift. 

For more details on Rehydrate, read the blog: Beyond Endpoint Recovery: Absolute Rehydrate and the New Era of Anti-Fragility

Acerca de Absolute Security

Absolute Security se ha asociado con más de 28 de los principales fabricantes de dispositivos de punto final del mundo, está integrado en el firmware de 600 millones de dispositivos, cuenta con la confianza de miles de clientes empresariales de todo el mundo y cuenta con licencias para 16 millones de usuarios de PC. Con la plataforma de ciberresiliencia de Absolute Security integrada en su empresa digital, los clientes se aseguran de que sus equipos de trabajo móviles e híbridos se conecten de forma segura y fluida desde cualquier parte del mundo y de que las operaciones empresariales se recuperen rápidamente tras las interrupciones y los ciberataques. Nuestras capacidades galardonadas se han ganado el reconocimiento y el estatus de liderazgo en múltiples categorías de tecnología, entre las que se incluyen Acceso a la red Zero Trust (ZTNA), Seguridad de terminales, Security Services Edge (SSE), persistencia integrada en el firmware, evaluación automatizada del control de seguridad (ASCA) y plataformas Zero Trust. Para obtener más información, visite www.absolute.com y síguenos en LinkedIn, X, Facebook, y YouTube.

ABSOLUTE SECURITY, ABSOLUTE, EL LOGOTIPO DE ABSOLUTE Y NETMOTION son marcas comerciales registradas de Absolute Software Corporation ©2025 o de sus subsidiarias. Todos los derechos reservados. Otros nombres o logotipos mencionados en este documento pueden ser marcas comerciales de Absolute o de sus respectivos propietarios. La ausencia de los símbolos™ y® en las proximidades de cada marca comercial, o en absoluto, en este documento no constituye una renuncia a la propiedad de la marca comercial relacionada. Absolute Security es una compañía de cartera de Crosspoint Capital.

Para obtener más información, póngase en contacto con:

Relaciones con los medios
Joe Franscella
press@absolute.com