At a glance
Free, limited time access for Application Persistence for supported VPNs
Supports Cisco AnyConnect, F5 BIG-IP VPN, and Pulse Connect
Proactively repairs and reinstalls VPN applications if misconfigured, corrupted or removed

As the world responds to COVID-19, working remotely has shifted from a precautionary measure to a mandated requirement. And IT teams need to ensure secure, uninterrupted access to corporate networks in response.
This feature is normally only available with a Resilience license, but all devices with Visibility and Control licenses are now able to persist and self-heal 3 widely-used VPN products:


Application Persistence gives these apps the same ability to self-heal and proactively repair — so you'll be able to help ensure that your employees have secure, flexible access to all the data and applications they need to do their jobs.
To learn how Application Persistence works, visit this page. To configure specific policies for your organization, visit the help page.
How Application Persistence makes remote work efficient and secure
- Allows any supported application to automatically regenerate to a desired configuration
- Maximizes VPN uptime, even if the application or relevant files are removed or altered
- Protects sensitive data like IP, PII, and PHI when accessed from outside the network
- Allows employees to maintain productivity by accessing online tools remotely
- Ensures internal and regulatory compliance
- Provides the same functionality on or off the corporate network
FAQs
1. Why VPN?
VPN is an essential tool for maintaining security while working offsite. In a recent study of endpoints, we discovered that nearly half of the endpoint devices with a VPN installed have one that is misconfigured, out-of-date, or non-compliant.
2. Is Application Persistence for any VPN application included for free?
We’re enabling Application Persistence for the three VPN apps that Absolute supports “out of the box”: Cisco AnyConnect Secure Mobility Client, F5 BIG-IP Edge Client, and Pulse Connect Secure. Other VPN apps can also take advantage of Application Persistence, but they require custom solutions that can be created with a paid Professional Services engagement.
3. How do I activate Application Persistence for VPN?
Take a look at these activation instructions to get started. If you need instructions for a specific VPN application, please see the Help page, or the specific Help pages on each VPN application (Cisco AnyConnect Secure Mobility Client, F5 BIG-IP Edge Client, or Pulse Connect Secure). If you’re looking for 1-on-1 support, fill out the form above and a Sales Development Representative will give you a call.
4. How does Application Persistence work?
Over 25 device manufacturers factory-embed Absolute in the firmware of their devices. This allows Absolute to self-heal after it’s disabled or removed, and this ability can be extended to VPNs and other apps with Application Persistence. If you’d like to learn more about how Application persistence works, visit the Application Persistence section of the Learning Hub.
5. Is Application Persistence able to support other security apps?
Application Persistence is also available to automatically remediate other applications and is included with a Resilience license. Absolute Resilience natively supports apps for data protection (BitLocker, WinMagic SecureDoc, Dell Encryption, Dell Data Guardian), endpoint management (SCCM, Ivanti Patch for Windows, Ivanti Endpoint Management, VMware Workspace ONE), and endpoint protection (ESET Endpoint Antivirus, VMware Carbon Black Cloud, CrowdStrike Falcon, McAfee ePolicy Orchestrator, Dell Advanced Threat Prevention, Ziften Zenith). Other applications may be persisted as well but require a paid Professional Services engagement.
6. What is a VPN?
VPNs, or Virtual Private Networks, allow users to create secure connection to the organization's environment over non secure network. VPNs can protect that traffic from prying eyes and secure the traffic to resources that are typically only available to employees when they are safely connected to their internal organizational networks.