Features & Editions

Choose the edition that's right for you.

Absolute Visibility

See all devices, on and off your network, and collect hundreds of hardware, software, security, usage, and geolocation data points automatically, with 365 days of historical logs.

  • Hardware inventory
  • Software inventory
  • Device location & history
  • Application health reporting
  • Automated & customizable alerts
  • Persistence® technology

Absolute Control

Go beyond device tracking, with the ability to take remote action to remediate endpoint risks immediately.

All Absolute Visibility features
  • Device freeze — on-demand or with offline timer
  • Full or selective data delete
  • Define geofences to detect unauthorized device movement

Frequently Asked Questions

What does the Absolute platform do?
The Absolute platform is a cloud-based Endpoint Visibility and Control solution that allows you to see all your devices and apps, secure your data, and prove compliance.
I’m looking for Computrace. Is the Absolute platform the same?
Computrace is a former product and brand of Absolute’s, superseded in 2015. The Absolute platform includes newer and enhanced versions of the device tracking capabilities of Computrace, plus numerous new capabilities to help with security and compliance. This includes the ability to remotely execute scripts on devices, scan for sensitive data, and self-heal critical third-party applications. The Absolute platform provides all the popular features of Computrace and much more.
I’m looking for LoJack for Laptops. Is the Absolute platform the same?

LoJack for Laptops1 is a former product and brand. Device tracking and recovery features are available for individuals via Absolute Home & Office, and for businesses/schools via the Absolute editions listed above.

1 LoJack® is a registered trademark of CalAMP.

What is Absolute Visibility?
Absolute Visibility is an edition of the Absolute platform that provides information on device hardware, software, and location.
What is Absolute Control?
Absolute Control is an edition of the Absolute platform. It includes all Absolute Visibility functionality as well as remediation capabilities, such as the ability to remotely freeze devices and delete data.
What is Absolute Resilience?
Absolute Resilience is the most popular edition of the Absolute platform. It includes all Absolute Visibility and Control features, plus remote scripting, self-healing for critical apps, investigation and recovery services, and sensitive data identification. The extensive capabilities of Absolute Resilience span IT asset intelligence, automated endpoint hygiene, and continuous compliance, providing the power to see, manage, and secure every endpoint, everywhere.
Do I need to purchase the same edition for every device?
No. You can secure your devices with whichever combination of editions best supports your needs.
What is Absolute Persistence?

Absolute's Persistence® is a patented security solution that provides a continuous, tamper-proof connection between devices, data, and the cloud-based Absolute console.

Through our partnerships with device manufacturers such as Dell, HP, Lenovo and others, Persistence is embedded in the firmware of computers, tablets, and smartphones at the factory, remaining dormant until the Absolute agent is installed. Installation initiates a call to the Absolute Monitoring Center, and Persistence is activated.

Once activated, the status of the Absolute agent or any third-party applications is continuously monitored and, if it is missing or damaged, a reinstallation will automatically occur. Persistence will survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is flashed.

What is Application Persistence?

Application Persistence is a feature of Absolute Resilience that provides embedded, self-healing capabilities to third-party endpoint controls, such as VPN, anti-virus, encryption, systems management, and other critical applications.

Virtually any app can be automatically reinstalled, regularly checked for version control & integrity, and IT teams alerted the moment anything abnormal occurs.

Application Persistence works with devices on or off your corporate network, and, as Persistence technology is embedded at the factory, it can’t be compromised.

How do I purchase Absolute?
Absolute can be purchased through leading device manufacturers, resellers, and distributors. Contact us and we would be happy to help you with this process.
Which operating systems are supported?
The Absolute platform supports Windows, MacOS, Android, and Chromebook devices. The cloud-based console that is used to secure and manage devices can be accessed from any device or operating system. See more information on system requirements.
How is the Absolute software agent installed?
The Absolute software agent can be installed using standard software distribution methods. This can be done on an individual device using installation widgets, or across multiple devices using disk imaging, Microsoft SCCM, or Active Directory. Other software distribution tools can also be used.
Can Absolute protect devices that are not connected to a network?
Yes. Absolute only requires that the device has an internet connection to communicate with the monitoring center. This allows for communication even when devices are not connected to your corporate network.
Can I use Absolute for IT asset management?
Yes. Absolute is used by many customers to track and manage all of their devices, data, and apps. This extends beyond traditional IT asset management with analytics to provide Asset Intelligence.
Can Absolute be used to help with compliance requirements?
Yes. Whether its GDPR, HIPAA, or other internal or regulatory requirements, Absolute provides current and historical information on the status of the device, including configuration, health of security controls, and presence of sensitive data. Absolute also provides remote remediation capabilities to protect data and secure devices, all helping to maintain and prove compliance.
Which products can Absolute help me replace?

Many organizations use Absolute to replace existing IT asset management tools and processes, and to supplement many popular security and device management solutions, such as Microsoft SCCM, Microsoft Intune, VMWare Workspace One, MobileIron, and more.

Absolute can be used to report on the health of — and fill gaps in — these applications. Popular complementary features include: self-healing critical security controls, identifying sensitive data, and providing visibility into devices not managed by other solutions.

Back to Top