No items found.

Absolute Geolocation

FAQ
What is Absolute Geolocation and how does it work? Get answers to these and other relevant questions about how IT teams can utilize the feature to track and secure remote devices.

Absolute Geolocation

What is Absolute Geolocation and how does it work? Get answers to these and other relevant questions about how IT teams can utilize the feature to track and secure remote devices.

Absolute Geolocation helps IT and security teams track the current and past location(s) of their remote endpoints to manage and secure them. This helps with maintain device inventory, comply with IT policies and enable forensics to recover devices that are lost, stolen or compromised.

Key Highlights:

  • Identify the current and previous location(s) (i.e. up to 365 days) of a remote endpoint.
  • Assess your devices’ current locations through detailed reports or a map view
  • Be alerted and act when a device breaches an approved location boundary

Learn details about how Absolute Geolocation works, its core use cases and availability through the Secure Endpoint product tiers.

FAQs

Absolute Visibility is the entry service tier in the Absolute Secure Endpoint portfolio. Absolute Visibility collects data about the endpoints' location, security posture, and hardware/software inventory. It provides analysis of software, Web applications, and hardware utilization as well as identifies potential failure points, sensitive data, and suspicious use patterns.

Absolute Control is the mid-service tier in the Absolute Secure Endpoint portfolio. Absolute Control adds to Absolute Visibility’s capabilities to control endpoints over the Internet, allowing for critical functions such as remote file deletion and data wipe, freezing devices on demand when at-risk, end user messaging, as well as establishing geo-fences and alerts.

Absolute Resilience is the third product edition in the Absolute Secure Endpoint product portfolio. Compared to Absolute Control, it adds further capabilities to secure endpoints from IT or security risks, respond to unexpected downtime due to security breaches and incidents, and enable Application Resilience to automatically monitor and detect unhealthy applications and automatically heal them.

Absolute Resilience for Automation is the highest product edition in the Absolute Secure Endpoint product portfolio, offering automated remediation of operating system, software and security vulnerabilities to eliminate risk and reduce an organization’s attack surface. It combines all the capabilities of Absolute Visibility™, Absolute Control™, Absolute Resilience™ and Absolute Resilience for Security™ with two critical features, Remediate and Automate.

Absolute Resilience for Security is the fourth product edition in the Absolute Secure Endpoint product portfolio. It combines all the capabilities of Absolute Visibility™, Absolute Control™ and Absolute Resilience™ with the Patch module, enabling IT and security teams to scan their endpoint population to assess patch health in relation to known operating system and software vulnerabilities.