Secure Endpoint

Absolute Control

Retain command of all your endpoints, all the time – even if they’re off your corporate network

Take action to safeguard your devices, applications, and data

Endpoint visibility is important. However, it’s even more crucial to safeguard your devices, applications, and data based on what you’ve learned by gathering the truth across your endpoints. Endpoint control is the next step in your endpoint management and security strategy.


Absolute Control™ includes all the capabilities of Visibility™ plus critical endpoint control functions:

Detect unauthorized device movement

Define geofences to detect unauthorized device movement and be alerted when a device crosses an established boundary.

Remotely freeze at-risk devices

Freeze devices when threats have been detected, and notify users with a custom message - automated or on demand.

Remotely delete data

Selectively delete files on any device from anywhere and remotely perform an end-of-life device wipe in accordance with NIST 800-88 with compliance certificate.

Send secure, on-device end user communications

Inform users in a coordinated fashion by displaying important messaging in real-time on their devices’ screen or to solicit feedback even if their device has been compromised or other communication tools have been rendered inoperable.

Streamline missing device reclamation process

Improve missing device return rates by leveraging capabilities like on-device end user communications, device freeze, and geolocation tracking.

Enable firmware protection

Create, remove, or change supervisor password remotely and at scale on specific Lenovo devices.

Safeguard your devices

Earn trust and prove compliance

  • Freeze lost or stolen devices. Set geofences and timers to automatically trigger these actions whenever a device leaves a safe area or stops calling in.
  • Selectively wipe data from at-risk endpoints. Perform end-of-life device wipes remotely and generate compliance certificates.

Send secure, on-device end user communications

Reach your end users whenever needed

  • Display important messaging on your users’ devices’, preventing unnecessary helpdesk support calls and fragmented communications. Avoid confusion when informing users of an upcoming IT event, providing instructions on how to avoid any imminent ransomware threats, or soliciting feedback through surveys.
  • Enable continuous, real-time communication even when other communications tools are offline or have explicitly been rendered inoperable by malware or ransomware.

Enable firmware protection without bringing devices in

Remotely manage supervisor passwords

  • Get unprecedented control over your endpoint security configurations — and prevent unauthorized changes to them — by remotely managing supervisor passwords for supported Lenovo devices.

What our customers love about Absolute Control

"As a CIO, Absolute gives me peace of mind so I can sleep at night. It has strengthened our security posture, allowing us to stay in compliance and giving us that extra level of comfort."

George Gunther

CIO at Asplundh

Looking for a Bigger Toolbox?

Absolute Control provides you a lifeline to protect at-risk devices and data. Explore the entire Absolute Secure Endpoint product portfolio to identify the service tier that meets your organization's needs. Check out Absolute Resilience™ to determine what service tier is right for you.


Absolute Visibility

Serves as your source of truth for device and application health.

Request a Demo

What's Included

  • Customizable dashboard, reports and alerts
  • Measure device usage
  • Automate hardware inventory
  • Inventory installed software
  • Assess security posture
  • Monitor application health
  • Locate and map your entire device fleet
  • Remotely scan for sensitive information
  • Track usage of Web apps and understand their ROI

Learn more


Absolute Control

Provides you a lifeline to protect at-risk devices and data.

Request a Demo

All Visibility features, plus

  • Draw geofences and detect unauthorized device movement
  • Remote device freeze, on-demand or with offline timer
  • Delete specific file or fully wipe the hard drive
  • Enable firmware protection
  • Secure, on-device end user communications

Learn more


Absolute Resilience

Delivers application self-healing and confident risk response.

Request a Demo

All Control features, plus 

  • Monitor basic application health parameters to determine any failures for swift self-mitigation
  • Make critical applications self-healing
  • Remotely run query or remediation scripts
  • Investigate and recover stolen devices

Learn more

Absolute Control Add-Ons

Absolute Ransomware Response for Control

Augment your Absolute Control capabilities to gain an advantage for ransomware preparedness and recovery across your device fleet.

Learn more

Related Product Packages

Absolute Control for Chromebooks

Specifically tailored capabilities for Chromebook users.

Learn more

G2 names Absolute a Leader in Endpoint Management

G2 Leader Spring 2024 G2 Leader Enterprise Spring 2024 G2 Momentum Leader Spring 2024 G2 Leader Mid-Market Spring 2024 G2 Best Meets Requirements Small Business Spring 2024 G2 High Performer Small Business Spring 2024 G2 Users Love Us G2 High Performer Canada Spring 2024 G2 High Performer Europe Spring 2024 G2 High Performer EMEA Spring 2024

Hear from your peers in the G2 Spring 2024 Report for Endpoint Management.

Download the Report

Secure Endpoint FAQ

Take action and learn more

Like what you're hearing?

We’d love to show you how Absolute can secure and empower your organization.

Looking for more information? Join a product overview webinar

Secure Endpoint

Managing and Securing Your Chromebook Devices

On-demand Webinar

Secure Access

ZTNA: Secure Web Gateway

On-demand Webinar

View all

Financial Services