A core component of the Absolute Platform – leveraging its privileged position in the firmware of more than 600 million endpoints
Unique, patented technology
Absolute Persistence® technology is already embedded in over 600 million devices as a result of Absolute’s partnership with close to 30 international system manufacturers. Once activated, this technology is fiercely resilient and is the only security solution that will survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.
No other technology can do this.
Thanks to Absolute’s unique position in the device firmware, it can guarantee the health of that stream of data and your mission-critical apps.
If anything is missing or disabled, Absolute reinstalls it. Even if the device has been re-imaged or if the hard drive has been swapped out. Your endpoint visibility, control, and critical are truly persistent with Absolute.
What is Absolute Persistence®?
For over 25 years, Absolute has led the way with Persistence®: the only technology that enables firmware-embedded endpoint resilience. Absolute Persistence is already embedded in the devices made by the world’s leading system manufacturers before they leave the factory.
Check device compatibility
Provides the ability to monitor application health and automatically repair and/or re-install unhealthy third-party applications listed in the Application Resilience catalog.
Provides the ability to monitor, optimize and automatically restore unhealthy network connections to avoid user interruption, reconnection, and re-authentication.
See all your devices, all the time, from a cloud-based dashboard that alerts you when risks appear. This allows you to streamline your device lifecycle management. Know where all your sensitive data lives, allowing you to identify at-risk devices. React to issues before they impact your end users, improving helpdesk efficiency.
Respond to endpoint risks by having always-on connectivity to the endpoint, even if the device has been compromised. Enforce security standards and strengthen your compliance posture.
Are your endpoints compatible?
Absolute Persistence is already embedded in the devices made by the world’s leading system manufacturers before they leave the factory. But if you need more clarity, check out if your device models are supported.
Absolute Persistence forms an unbreakable, two-way connection that heals itself, enabling unprecedented endpoint intelligence
Applications can heal themselves with Application Resilience
The same BIOS-embedded Persistence can be extended to any application that runs on the same devices as Absolute. No matter who you are, if you rely on a suite of apps, Application Resilience means peace of mind for you and your organization.
Learn About Application Resilience
Learn about Application Persistence-as-a-Service for ISVs
Get to know Persistence, the only technology that keeps you in complete command with a self-healing, two-way connection to any endpoint or application — even off your network.
Get the details on Application Persistence, Absolute's one-of-a-kind platform that offers unstoppable reporting and remediation to any app that runs on Windows 7 or higher.
What our customers love about Absolute
“We are amazed at their Persistence technology. An IT team member took a hard drive out and put it on another machine. The Absolute software client created itself on the new machine and the old machine with a new hard drive. Indestructible.”
David Reynolds - Systems Manager, IT
Rhode Island Blood Center
Absolute Persistence FAQ
Absolute Persistence® is unique, patented technology embedded in the firmware of 600+ million devices that provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint. The Persistence technology is installed in the firmware of most endpoint devices at the factory. Each device leaves the factory with the Persistence technology in place, waiting to be activated. Activation occurs when a customer purchases an Absolute product that supports Persistence and installs the necessary software agent.
Persistence technology is factory-embedded into the core of most endpoint devices. Once activated, it gives you unrivalled visibility and control to confidently manage your endpoints, protect at-risk data, as well as investigate and remediate potential threats. Persistence is the only firmware-embedded solution that will survive attempts to disable it, even if the device is reimaged, the hard drive is replaced, or the firmware is updated.
Through our partnership with system manufacturers, the Persistence technology is embedded in the firmware of endpoint devices at the factory. Persistence leverages Absolute’s secure channel from the cloud-based console down to the firmware. In doing so, it maintains an always-on digital tether between device and Absolute Console, ensuring two-way communication so you can reliably query information and run actions remotely.
Persistence technology remains dormant in the firmware until the Absolute Agent is installed. Once the Absolute Agent is installed, it initiates a call to the Absolute Platform and Persistence is then activated. This means that the status of the software agent is monitored and if it is missing, a reinstallation will automatically occur.
All Absolute products support Persistence technology. The software agent is installed on computers in the operating system by running an installer or when the device is imaged. The software agent sends information from each device to the Absolute Platform for IT administrators and security professionals to assess risks and to take appropriate action.
The Absolute Agent makes regularly scheduled calls over the Internet to the Absolute Platform, where customers access their account via the cloud-based Absolute Console. Telemetry collected includes device, data, application, and user information. Customers can define conditions and receive alerts if the conditions occur, allowing them to respond immediately to any potential security incident. The software agent also supports remote actions such as the running of scripts through Absolute Reach™ and self-healing of critical security applications through Application Resilience™.
No. If the Persistence technology has been enabled, the self-healing capability will repair the Absolute Agent, or any other applications supported by Application Resilience™. The computer will still be protected. The enable/disable state of the Persistence technology is stored in a part of the BIOS that cannot be flashed to remove it.
What type of protection is provided for communication between the Absolute Agent and the Absolute Platform?
The communication between the software agent and the Absolute Platform is encrypted. Optionally, you can also enable FIPS-140 certified communication. The Federal Information Processing Standard (FIPS) Publication 140-2 is a US government security standard that specifies the security requirements for cryptographic modules protecting sensitive information. The National Institutes of Standards and Technology (NIST) publishes the list of vendors with validated FIPS 140-1 and 140-2 cryptographic modules. The Absolute Encryption Engine is validated FIPS 140-2.
Take action and learn more
How to buy
Choose the Absolute product package that provides the benefits your organization needs.
Explore our use cases to learn how you can maximize the return on your tech investment with Absolute.
View all use cases
Take the tour
Sign up for a demo and learn how Absolute can empower your organization.
Request a demo
Want to learn more about APaaS for your organization?
If you’d like to make a specific application self-healing and resilient, we can create a custom solution. Contact us to see what Absolute can do for you.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join an upcoming product overview with live Q&A
Secure EndpointSelf Healing: Ensure the efficacy of your most valued security applications
June 13, 2023 | 8:30 AM PT
Secure AccessEndpoint & Network Visibility: Ensure visibility and control, even outside of the corporate network
June 27, 2023 | 8:30 AM PT