Features & Editions
Choose the edition that's right for you.
Absolute Visibility
See all devices, on and off your network, and collect hundreds of hardware, software, security, usage, and geolocation data points automatically, with 365 days of historical logs.
- Hardware inventory
- Software inventory
- Device location & history
- Application health reporting
- Automated & customizable alerts
- Persistence® technology
Absolute Control
Go beyond device tracking, with the ability to take remote action to remediate endpoint risks immediately.
- Device freeze — on-demand or with offline timer
- Full or selective data delete
- Define geofences to detect unauthorized device movement
Download the Full Edition Comparison Chart
View features for Chromebooks
or Cloudbooks
View features by Operating
System
Frequently Asked Questions
LoJack for Laptops1 is a former product and brand. Device tracking and recovery features are available for individuals via Absolute Home & Office, and for businesses/schools via the Absolute editions listed above.
1 LoJack® is a registered trademark of CalAMP.
Absolute's Persistence® is a patented security solution that provides a continuous, tamper-proof connection between devices, data, and the cloud-based Absolute console.
Through our partnerships with device manufacturers such as Dell, HP, Lenovo and others, Persistence is embedded in the firmware of computers, tablets, and smartphones at the factory, remaining dormant until the Absolute agent is installed. Installation initiates a call to the Absolute Monitoring Center, and Persistence is activated.
Once activated, the status of the Absolute agent or any third-party applications is continuously monitored and, if it is missing or damaged, a reinstallation will automatically occur. Persistence will survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is flashed.
Application Persistence is a feature of Absolute Resilience that provides embedded, self-healing capabilities to third-party endpoint controls, such as VPN, anti-virus, encryption, systems management, and other critical applications.
Virtually any app can be automatically reinstalled, regularly checked for version control & integrity, and IT teams alerted the moment anything abnormal occurs.
Application Persistence works with devices on or off your corporate network, and, as Persistence technology is embedded at the factory, it can’t be compromised.
Many organizations use Absolute to replace existing IT asset management tools and processes, and to supplement many popular security and device management solutions, such as Microsoft SCCM, Microsoft Intune, VMWare Workspace One, MobileIron, and more.
Absolute can be used to report on the health of — and fill gaps in — these applications. Popular complementary features include: self-healing critical security controls, identifying sensitive data, and providing visibility into devices not managed by other solutions.