Establish resilient security by ensuring your critical apps remain active at all times. Remotely identify sensitive data, track web usage, gather precise insights or remediate endpoint vulnerabilities, and investigate stolen devices.
Absolute Console Cloud-based console, centralized dashboard, customizable widgets, pre-defined and customized reports and alerts, role-based access control, single sign-on, 2-factor authentication
Track Hardware Report and alert on hundreds of hardware attributes, pre-built and custom reports, track new device activations and connection history, track the evolution of offline devices, flag missing devices and be alerted when they connect to the internet, track device location with 365 days of history
Measure Device Usage Assess device usage based on device interaction events, report on daily average usage by device, and compare usage across different device groups to detect underutilized devices
Monitor Installed Software Assess installed software on your devices to identify possible license non-compliance or waste, vulnerable apps or versions, policy non-compliance, and shadow IT or new user needs
Assess Security Posture Report on encryption and anti-malware status across your device population, monitor evolution of encryption status over time
Monitor Health of Critical Applications 2 Report on the health status of critical applications, such as Endpoint Management, VPN, Endpoint Protection, or Data Protection
3rd-party Integrations Integration with ServiceNow and SIEM tools
Detect Unauthorized Device Movement Define geofences to detect unauthorized device movement and be alerted when a device crosses a geofence
Remotely Freeze Devices Freeze a device with custom message - scheduled or on demand, set an offline timer to automatically freeze devices
Remotely Delete Data Selectively delete files on any device, and perform an end-of-life device wipe with compliance certificate
Enable Firmware Protection 3 Create, remove, or change supervisor password remotely and at scale
Make Critical Applications Self-healing 2 Enable resilient endpoint security, by automatically repairing and reinstalling critical applications, such as Endpoint Management, VPN, Endpoint Protection, Data Protection, when they are found to be missing, disabled, or not running in a healthy state
Identify Sensitive Information on Devices Discover PII, PHI, PFI, SSN, GDPR data and Intellectual Property on/off network, assess data risk, estimate cost of exposure, identify devices with sensitive files syncing with cloud storage (Dropbox, iCloud, Box, OneDrive)
Remotely Query & Remediate Devices at Scale Leverage 130+ pre-built workflows from the Reach Library, and run any custom PowerShell or BASH script on one or multiple devices
Investigate and Recover Stolen Devices Leverage the expert Absolute Investigations team to investigate and recover stolen devices in collaboration with law enforcement (Service Guarantee for unrecovered devices is only available to Education customers in North America, UK and Australia 4 )
Understand Web Usage 5 See what web content users are effectively focused on, as well as how often and for how long online tools are used, and identify if insecure or inappropriate content or websites are visited
Absolute Control Mobile App Check the status of critical security controls on any device reported as lost or stolen, and freeze it immediately through the Absolute Control mobile app.
2020 Cyber Catalyst Designated Solution Organizations that adopt Cyber Catalyst designated solutions may be considered for enhanced terms and conditions on individually negotiated cyber insurance policies with participating insurers. Cyber Catalyst participating insurers rated Absolute Resilience highest on the criteria of key performance metrics, efficiency, and flexibility.
2 Applications supported directly through the product: Endpoint Management (Microsoft SCCM, VMware Workspace ONE, Tanium, Citrix Workspace, Ivanti Endpoint Manager), VPN (Cisco AnyConnect, F5 BIG-IP Edge Client, Pulse Secure, Palo Alto GlobalProtect, Netskope), Endpoint Protection (Dell Advanced Threat Prevention, VMware Carbon Black Cloud, ESET Endpoint Antivirus, CrowdStrike Falcon, McAfee ePO, Ziften Zenith), and Data Protection (Microsoft BitLocker, Dell Encryption Enterprise, Dell Data Guardian, WinMagic SecureDoc Encryption). Any other application of your choice may be supported through a Professional Services engagement, which can be quoted upon request. Learn more
4 Terms and Conditions apply. See FAQ for more details.
5 Only available for Chrome browser, on Windows and Chromebook devices.
Frequently Asked Questions
What does the Absolute platform do?
The Absolute platform is a cloud-based Endpoint Visibility and
Control solution that allows you to see all your devices and apps, secure your data, and
I’m looking for Computrace. Is the
Absolute platform the same?
Computrace is a former product and brand of Absolute’s,
superseded in 2015. The Absolute platform includes newer and enhanced versions of the
device tracking capabilities of Computrace, plus numerous new capabilities to help with
security and compliance. This includes the ability to remotely execute scripts on
devices, scan for sensitive data, and self-heal critical third-party applications. The
Absolute platform provides all the popular features of Computrace and much more.
I’m looking for LoJack for
Laptops. Is the Absolute platform the same?
LoJack for Laptops1 is a former product and brand. Device tracking and
recovery features are available for individuals via Absolute Home &
Office, and for businesses/schools via the Absolute products listed above.
1 LoJack® is a registered
trademark of CalAMP.
What is Absolute Visibility?
Absolute Visibility is a product of the Absolute platform
that provides information on device hardware, software, and location.
What is Absolute Control?
Absolute Control is a product of the Absolute platform. It
includes all Absolute Visibility functionality as well as remediation capabilities, such
as the ability to remotely freeze devices and delete data.
What is Absolute Resilience?
Absolute Resilience is the most popular product of the
Absolute platform. It includes all Absolute Visibility and Control features, plus remote
scripting, self-healing for critical apps, investigation and recovery services, and
sensitive data identification. The extensive capabilities of Absolute Resilience span IT
asset intelligence, automated endpoint hygiene, and continuous compliance, providing the
power to see, manage, and secure every endpoint, everywhere.
Do I need to purchase the same product
for every device?
No. You can secure your devices with whichever combination of
products best supports your needs.
What is Absolute Persistence?
Absolute's Persistence® is a patented security solution that provides
a continuous, tamper-proof connection between devices, data, and the cloud-based
Through our partnerships with device manufacturers such as Dell, HP, Lenovo and
others, Persistence is embedded in the firmware of computers, tablets, and
smartphones at the factory, remaining dormant until the Absolute agent is installed.
Installation initiates a call to the Absolute Monitoring Center, and Persistence is
Once activated, the status of the Absolute agent or any
third-party applications is continuously monitored and, if it is missing or damaged,
a reinstallation will automatically occur. Persistence will survive attempts to
disable it, even if the device is re-imaged, the hard drive is replaced, or the
firmware is flashed.
What is Application Persistence?
Application Persistence is a feature of Absolute Resilience that provides embedded,
self-healing capabilities to third-party endpoint controls, such as VPN, anti-virus,
encryption, systems management, and other critical applications.
Virtually any app can be automatically reinstalled, regularly checked for version
control & integrity, and IT teams alerted the moment anything abnormal occurs.
Application Persistence works with devices on or off your
corporate network, and, as Persistence technology is embedded at the factory, it
can’t be compromised.
How do I purchase Absolute?
Absolute can be purchased through leading device
manufacturers, resellers, and distributors. Contact us
and we would be happy to help you with this process.
Which operating systems are supported?
The Absolute platform supports Windows, MacOS, Android, and
Chromebook devices. The cloud-based console that is used to secure and manage devices
can be accessed from any device or operating system. See more information on system requirements.
How is the Absolute software agent
The Absolute software agent can be installed using standard
software distribution methods. This can be done on an individual device using
installation widgets, or across multiple devices using disk imaging, Microsoft SCCM, or
Active Directory. Other software distribution tools can also be used.
Can Absolute protect devices that are
not connected to a network?
Yes. Absolute only requires that the device has an internet
connection to communicate with the monitoring center. This allows for communication even
when devices are not connected to your corporate network.
Can I use Absolute for IT asset
Yes. Absolute is used by many customers to track and manage
all of their devices, data, and apps. This extends beyond traditional IT asset
management with analytics to provide Asset
Can Absolute be used to help with
Yes. Whether its GDPR, HIPAA, or other internal or regulatory
requirements, Absolute provides current and historical information on the status of the
device, including configuration, health of security controls, and presence of sensitive
data. Absolute also provides remote remediation capabilities to protect data and secure
devices, all helping to maintain and prove compliance. Learn more about how Absolute can help your organization prove compliance.
Which products can Absolute help me
Many organizations use Absolute to replace existing IT asset management tools and
processes, and to supplement many popular security and device management solutions,
such as Microsoft SCCM, Microsoft Intune, VMWare Workspace One, MobileIron, and
Absolute can be used to report on the health of — and
fill gaps in — these applications. Popular complementary features include:
self-healing critical security controls, identifying sensitive data, and providing
visibility into devices not managed by other solutions.