Absolute Secure Endpoint

Reliable, resilient endpoints for the anywhere workforce


Setting the cyber resiliency bar for your device fleet

Ensuring that your employees’ endpoints are cyber-resilient is paramount to productivity, business continuity, as well as your organization’s security and compliance posture. Absolute is known as the pioneer of endpoint resilience. Unique, patented Persistence® technology embedded in the firmware of 600+ million devices provides a secure, always-on connection between the Absolute cyber resilience platform and your endpoints. This allows IT and security personnel to monitor and address computers’ problems and enables the devices and their mission-critical applications to self-heal.

Highlights

Absolute Secure Endpoint™ compliments your existing endpoint security and endpoint management tools to

Optimize hardware inventory management for audit accuracy and improved device allocation

Streamline software inventory and control to assure productivity and eradicate shadow IT

Understand device and Web application usage for improved ROI

Enable remote device lifecycle management to increase IT efficiency

Improve helpdesk effectiveness by anticipating device issues and improving time-to-resolution

Assess security posture for governance purposes and minimize risk exposure

Enforce security standards to comply with industry standards, regulatory mandates, and internal policies

Respond to endpoint risks at scale and efficiently

Recover from incidents with confidence

Give your IT team constant visibility into endpoints

Serves as source of truth for device and application health

  • Streamline hardware audits and software audits, avoid multi-platform fragmentation, optimize end user productivity, and optimize lease/licensing management.
  • Identify and eliminate hardware or software waste, analyze usage patterns, and prove ROI.
  • Track and locate all of your enrolled devices, on and off your corporate network.
  • Report on the health status of mission-critical applications.
  • Report on encryption and anti-virus/malware status across your device population.
  • Discover sensitive data (e.g., PII, PHI, company IP) across your device fleet and identify devices that are syncing sensitive files with cloud storage services.

Take action to safeguard your devices, apps, and data

Provides a lifeline to protect at-risk devices and data

  • Detect unauthorized device movement and be alerted when a device crosses an established geofence.
  • Freeze devices when threats have been detected and notify users with a custom message - automated or on demand.
  • Selectively delete files on any device from anywhere and remotely perform an end-of-life device wipe in accordance with NIST 800-88 with compliance certificate.

Achieve resilient, self-healing endpoints

Assure a confident risk response

  • Leverage Application Resilience to automatically repair or reinstall mission-critical applications when they have been disabled, or are not running in a healthy state.
  • Take remedial action across devices by leveraging a library of hundreds of customized scripts to accelerate your response and recovery efforts.
  • Leverage the expert Absolute Investigation team to locate and recover stolen devices in collaboration with law enforcement.

Boost ransomware preparedness and time-to-recovery

  • Assess your strategic ransomware readiness.
  • Establish a cyber hygiene baseline across endpoints.
  • Expedite recovery tasks by leveraging a set of unique capabilities (e.g., secure, on-device communications; device freeze; Reach script library).
  • Receive remote assistance in your endpoint recovery efforts following an established playbook that applies field-proven best practices.

Choose according to your business needs

Within the Absolute Secure Endpoint product portfolio, we offer a variety of products.

 

Absolute Visibility

Source of truth for device and application health.


Request a Demo

What's Included:

  • Device Health
  • Measure device usage
  • Security Posture
  • Application Health
  • Device Usage
  • Geolocation
  • Web Application Usage
  • Endpoint Data Discovery

Learn more

 

Absolute Control

Lifeline to protect at-risk devices and data.


Request a Demo

All Visibility capabilities, plus:

  • Geofencing
  • Device Freeze
  • File Delete
  • Device Wipe
  • End User Messaging
  • Remote Firmware Protection

Learn more

Absolute Resilience

Delivers application self-healing and confident risk response.


Request a Demo

All Control capabilities, plus:

  • Application Resilience
  • Remediation Script Library
  • Investigations and Recovery of Lost/Stolen Devices

Learn more

Absolute Ransomware Response

Ransomware preparedness and expedited recovery


Learn more

What's Included

  • Strategic Ransomware Readiness Check
  • Cyber Hygiene Baseline Across Endpoints
  • Recovery Task Acceleration
  • Remote Assistance

Compare Absolute product packages

Secure Endpoint FAQ

Absolute Secure Endpoint is one of our company’s core product lines, which leverages the unbreakable connection provided by Absolute Persistence® to enable IT and security personnel to monitor and address computers' problems and enables the computers and their mission-critical applications to self-heal. This helps with IT management, strengthening a company’s security posture, and maintaining compliance.

The Absolute Secure Endpoint product portfolio contains a variety of product packages:

  • Absolute Visibility
  • Absolute Control
  • Absolute Resilience
  • Absolute Ransomware Response

Other variants, such as Absolute Resilience for Student Devices, may be offered to meet particular use cases or geographic market needs.

Absolute Visibility is the entry service tier in the Absolute Secure Endpoint portfolio. Absolute Visibility collects data about the endpoints' location, security posture, and hardware/software inventory. It provides analysis of software, Web applications, and hardware utilization as well as identifies potential failure points, sensitive data, and suspicious use patterns.

Absolute Control is the mid-service tier in the Absolute Secure Endpoint portfolio. Absolute Control adds to Absolute Visibility’s capabilities to control endpoints over the Internet, allowing for critical functions such as remote file deletion and data wipe, freezing devices on demand when at-risk, end user messaging, as well as establishing geo-fences and alerts.

Absolute Resilience is the top service tier in the Absolute Secure Endpoint product portfolio and the most popular package among customers. Compared to Absolute Control, it adds further capabilities to secure endpoints from threats and vulnerabilities, respond to security breaches and incidents, and enable Application Resilience to automatically monitor and detect unhealthy applications and automatically heal them.

Absolute Ransomware Response is a stand-alone offering, which provides capabilities and services to assess an organization's ransomware preparedness and cyber hygiene across endpoints; ensures mission-critical security applications such as anti-malware and device management tools remain healthy and capable of self-healing; and expedites the quarantine and recovery of endpoints if a ransomware attack occurs.

Customers can easily upgrade/downgrade their service subscriptions between Absolute Visibility, Control, and Resilience. Capabilities are additive and enabled via a software license key.

Absolute Ransomware Response is offered as a stand-alone solution primarily for security-conscious customers. Add-on options are offered for Absolute Control and Resilience customers. Absolute Ransomware Response customers can later easily expand their capabilities by changing their subscription to the Absolute Resilience service tier.

Absolute can be purchased through leading device manufacturers, resellers, and distributors. Contact us and we would be happy to help you with this process.

Take action and learn more

Like what you're hearing?

We’d love to show you how Absolute can secure and empower your organization.

Financial Services