| |
Serves as your source of truth for device and application health. |
Provides you a lifeline to protect at-risk devices and data. |
Most Powerful
Delivers application self-healing and confident risk response. |
| Track hardware |
|
|
|
| Report and alert on hundreds of hardware attributes
|
|
|
|
| Monitor device leasing reports
|
|
|
|
| Track new device activations and connection history
|
|
|
|
| Leverage pre-built and custom reports
|
|
|
|
| Flag missing devices and be alerted when they connect to the internet
|
|
|
|
| Monitor Installed Software |
|
|
|
| Assess installed software by device or population
|
|
|
|
| Capture Device Insights |
|
|
|
| Collect Absolute defined data points from the DataExplorer Library1
|
|
|
|
| Configure the collection of custom data points tailored to specific needs using the DataExplorer Builder
|
|
|
|
| Assess Device Security Posture |
|
|
|
| Encryption status reporting
|
|
|
|
| Anti-malware status reporting
|
|
|
|
| Measure Device Usage |
|
|
|
| Assess device usage by analyzing login/unlock and device interaction events
|
|
|
|
| Report on average daily usage by device
|
|
|
|
| Report on visited websites and understand the ROI from Web Apps in your environment3
|
|
|
|
| Identify Sensitive Files On Devices |
|
|
|
| Discover PII, PHI, PFI, SSN, GDPR data and Intellectual Property on/off network
|
|
|
|
| Perform data risk assessment with estimated cost exposure
|
|
|
|
| Identify devices with sensitive files syncing with cloud storage (Dropbox, iCloud, Box, OneDrive)
|
|
|
|
| Monitor Device Location |
|
|
|
| Track device location with 365 days of history
|
|
|
|
| Define geofences to detect unauthorized device movement
|
|
|
|
| Remotely Freeze Devices |
|
|
|
| Freeze a device with custom message – scheduled or on demand
|
|
|
|
| Set an offline timer to automatically freeze devices
|
|
|
|
| Remotely Delete Data From Devices |
|
|
|
| Selectively delete files
|
|
|
|
| Perform an end-of-life device wipe with compliance certificate
|
|
|
|
| Enable Firmware Protection |
|
|
|
| Manage supervisor password at scale4
|
|
|
|
| Secure, On-Device End User Communications |
|
|
|
| Inform users by displaying important messaging on their devices’ screen or to solicit feedback
|
|
|
|
| Query and Remediate Devices Immediately at Scale |
|
|
|
| Run 130+ prebuilt workflows from Reach Library
|
|
|
|
| Run Custom Powershell or BASH scripts on devices
|
|
|
|
| Make Critical Applications Covered in Application Resilience Catalog Self-Healing6 |
|
|
|
| Mission-critical applications covered7
|
|
|
|
| Other applications8
|
|
|
|
| Investigate and Recover Stolen Devices |
|
|
|
| Recover stolen devices
|
|
|
|
| Service Guarantee for devices not recovered9 (Education only)
|
|
|
|
| Derive Historical IT and Security Insights |
|
|
|
| Absolute Insights™ for Endpoints10
|
|
|
|
| Missing Device Reclamation Service |
|
|
|
| Reclamation experts help to track, locate, and secure devices
|
|
|
|
| Absolute Platform Components |
|
|
|
| Absolute Persistence
|
|
|
|
| Absolute Mobile App
|
|
|
|
| Rules & Policy Engine
|
|
|
|
| Alerts
|
|
|
|
| Dashboards
|
|
|
|
| API Library
|
|
|
|
| Cloud-based console
|
|
|
|
| Predefined and customized alerts
|
|
|
|
| Universal SIEM connector
|
|
|
|
| Role-based access control
|
|
|
|
| Single sign-on
|
|
|
|
| 2-factor authentication
|
|
|
|
| Absolute Connector for ServiceNow®
|
|
|
|
| |
Get started with Absolute
Visibility |
Need more capabilities?
Control |
Need a larger feature set?
Resilience |