Absolute and HP: Better Together
For over 14 years, Absolute and HP have combined top-end hardware with unbreakable endpoint security.
HP embeds Absolute in the firmware of its devices as it produces them, allowing Absolute to heal itself. This creates a persistent connection between devices, their data, and the dashboard.
Absolute Persistence extends to HP’s proprietary security solutions, enabling them to survive attempts to disable or remove them.

Persistence®
Create a two-way connection that heals itself, enabling unprecedented visibility and control.
Absolute can uniquely survive formatting, uninstalls, and other attempts to neutralize it.

Intelligence
See every endpoint — and the apps and data on it.
Use this knowledge to fix blind spots, stay compliant, and make better decisions.

Resilience
Absolute Persistence extends to Sure Start, Sure Run, and Sure Sense.
Sustain these and other essential endpoint agents with automatic self-healing.

Data Protection
Locate, lock, and delete data on devices – on or off the corporate network.
Perform end-of-life device wipes with a compliance certificate.
HP Device Compatibility
HP has the largest portfolio of devices with Persistence from Absolute embedded in the firmware. For devices not listed, a BIOS Flash or firmware update may be available directly from HP.
Device ListAbout Absolute Persistence Technology
Absolute Persistence™ creates an unbreakable two-way connection between devices, data, and the Absolute console.
This connection provides more than visibility. It lets you remotely apply security measures to protect devices, as well as the apps and data on them.
HP embeds Absolute at the factory, protecting devices throughout their entire lifecycle.
Learn more about PersistenceAbsolute protects over 18,000 leading organizations worldwide

View these resources to learn more how Absolute provides persistent endpoint security
Absolute Platform Datasheet
The Absolute Platform is the only security solution that is factory-embedded in the firmware of devices - so it can't be compromised. It uniquely allows IT professionals to monitor, manage and control their entire endpoint population and ensure regulatory compliance.
2021 Endpoint Risk Report
Discover four key trends from nearly 5 million Absolute-enabled endpoints and see what enterprises are doing to minimize endpoint risk.
