Compliance
Compliance ensures businesses meet regulatory and security requirements. Here, you’ll find resources featuring key strategies on staying ahead of evolving laws and industry standards.
Browse all

Umm Al-Qura University
Saudi Arabia’s leading university turns to Absolute Secure Endpoint to strengthen endpoint security, improve compliance, and support digital transformation.

BW Offshore
Using Absolute Secure Endpoint, BW Offshore Improves IT Efficiencies and Asset Management

Smith Anderson
With Absolute Secure Endpoint, Smith Anderson Simplifies its Asset Management and Enhances IT Strategy

NHS Royal Free London
With Absolute Secure Endpoint, Royal Free London NHS Trust Enhances Asset Management, Recovering 55 Devices in One Year

US Foods
With Absolute, US Foods Improves Connectivity with Secure, Reliable Access to Corporate Resources

NHS Norfolk
Absolute Secure Access Provides Secure and Reliable Access for NHS Norfolk Community Trust’s Mobile Workforce

Centre Hospitalier Universitaire
Centre Hospitalier Universitaire uses Absolute Secure Endpoint to Enhance Security and Reduce Device Theft

Osborne Clarke
Law fFim Osborne Clarke Addresses Visibility and Connectivity issues with Absolute Secure Access to Meet Requirements of Clients and Staff

Ogletree Deakins
Ogletree Deakins Protects its Devices and Data with Absolute Secure Endpoint

Los Angeles Tourism & Convention Board
The Los Angeles Tourism and Convention Board Meets Compliance, Improves Security Posture, and Protects Devices with Absolute Secure Endpoint

Sound Physicians
Using Absolute Secure Endpoint, Sound Physicians Improves Asset Management and Device Control

Genpact
Genpact Uses Absolute Secure Endpoint to Ensure Their Endpoint Security Controls Are Protected and Always Working

NHS
Absolute Secure Endpoint Partners with Torbay and South Devon NHS Trust to Improve Asset Management Across 6k Device Fleet

Lantum
With Absolute Secure Endpoint, Lantum Increases Visibility and Control of their Device Fleet While Improving Compliance Scores

Rhode Island Blood Center
With Absolute Secure Endpoint, the Blood Bank is able to Comply with Regulations and Reduce Risk in the Event Devices are Lost or Stolen

Taylor Vinters
Absolute Secure Access Provides Taylor Vinters with Secure, Reliable Access to Improve Productivity in an Anywhere Workforce

United States Environmental Protection Agency
U.S. Environmental Protection Agency Turns to Absolute Secure Endpoint to Improve and Enhance Asset Management

Tullow Oil
Tullow Oil Chooses Absolute Secure Endpoint to Keep Devices and Data Safe Against Threats or Theft

Emergency Communications of Southern Oregon
Emergency Communications of Southern Oregon Leverages Absolute Secure Endpoint to Meet Compliance and Security Demands

Bovis Homes
Bovis Homes Focuses on Endpoint Security and Asset Management to Solve Compliance Challenges

Asplundh
Asplundh Uses Absolute Secure Endpoint to Protect its Distributed Workforce, Data, and Devices

Apria Healthcare
Absolute Secure Endpoint Provides Secure Health Solutions for Apria Healthcare, Keeping Devices and Data Safe

CareSource
Absolute Secure Endpoint Allows CareSource to Protect Devices and Data While Ensuring Compliance

Allina Health
Allina Health Cuts Costs, Protects Data, and Maintains Compliance with Absolute Secure Endpoint

Absolute Audit Readiness Guide
Learn how school districts stay audit ready, so they never have to worry about “getting audit ready”

Cost of a Healthcare Data Breach
New data protection regulations have increased the risk of fines and settlement fees. Learn how to avoid a costly data breach and embrace the digital healthcare revolution.

NIST Cybersecurity Framework Implementation Overview
Use these clear guidelines to implement the NIST's cybersecurity framework within your own organization.

Complying with GDPR: What All Organizations Need to Know
Prepare for audits and verify compliance with GDPR, so you can increase customer trust and avoid devastating fines.

Achieving HIPAA Compliance
Identify authorized and unauthorized devices on your network, ensure optimal security configurations, and conduct HIPAA & HITECH risk assessments with Absolute.

Guiding Federal Agencies to Compliance Faster
Explore key steps and actionable insights to help federal agencies fast-track Zero Trust compliance and CDM alignment.

Shine a Spotlight on Application Health to Improve Productivity & Security

New Role-Based Access Controls in Insights for Network

Hands-on Tour of AI Assistant and Customizable Dashboards

Rehydrate, AI Assistant, Customizable Dashboards and More

Strengthening Security and Compliance Posture through Cyber Resilience in Government

The Third Question: What CISOs Aren't Asking, and What's at Stake

Standardize your compliance reporting and control your remote devices

7 Steps to Protecting Data in the Era of Digital Care

Insights from an Industry Analyst: The Need for Resilient, Integrated Zero Trust

K-12 Peer Advice Forum: What’s Working for IT and Security Teams

3 Immediate Actions to Save Time While Managing Online Learning

Nailing It! 5 Ways to Win with the NIST Cybersecurity Framework

3 Essential Actions to Manage and Secure Remote Devices

Endpoint Resilience As A Proactive Security Strategy

Always-on Secure Tunnel: Establish Resilient and Persistent Remote Connections

Product Briefing: Critical Steps to Secure and Manage Your Remote Workforce

Empowering Organizations to Troubleshoot in a Remote Work Culture

Endpoint & Network Visibility: Ensure visibility & control, even outside of the corporate network

Self Healing: Ensure the efficacy of your most valued security applications

Ransomware Readiness: Is your organization prepared for a possible attack?

Preparing your Device Fleet for the Economic Downturn

Zero Trust Architecture: Implement & maintain a strong security posture

Leveraging Device Visibility to Boost Your IT & Security Processes

Digital Experience Monitoring: Gain actionable insight

Application Persistence: How to Secure Your Security

Customizable Dashboards
Transform your endpoint management with Customizable Dashboards. Visualize trends, ensure compliance, and optimize security with tailored insights. Download the data sheet to learn more.

Absolute Secure Endpoint for FedRAMP
Discover how Secure Endpoint builds cyber resilience for federal agencies by keeping devices, security controls, and compliance frameworks operational.

The Benefits of a Unique SSE Solution
Learn what makes Secure Access different and remarkable, from resilience to endpoint compliance.

CIS Critical Security Controls Evaluation Guide
The Center for Internet Security (CIS) publishes the CIS Critical Security Controls to help organizations better defend themselves against cyberattacks. See how the Absolute platform addresses top CIS considerations in this Evaluation Guide.

Absolute Device Wipe
Absolute Device Wipe enables organizations to wipe encrypted drives while adhering with NIST media sanitization guidelines. Ensure devices are securely sanitized for decommissioning purposes or to protect sensitive data.

HIPAA Compliance Evaluation Guide
The HIPAA Compliance Evaluation Guide looks in detail at the 3 safeguard categories within the HIPAA Security Rule, with a checklist to assess your organization’s data security and an overview of Absolute’s core capabilities in this area.

NIST CSF Evaluation Guide
Get an overview of the NIST Cybersecurity Framework for a comprehensive checklist to boost compliance.

CJIS Security Policy Evaluation Guide
Law enforcement and justice departments rely on CJIS systems and information, but access is dependent on stringent security controls. Find out how Absolute simplifies CIJS compliance in this Evaluation Guide.

CIS Controls Framework Evaluation Guide
Defend your organization better by prioritizing and implementing the best practices recommended by the Center for Internet Security.

HITECH Compliance Evaluation Guide
Achieve HITECH compliance across your endpoint population with this comprehensive checklist. And do it faster with Absolute.

GDPR
Stay audit-ready with our practical guide to GDPR – and be completely ready with Absolute's always-on visibility, control, and resilience.

Absolute Connector for Forescout eyeSight Solution Brief
The Absolute Connector for Forescout eyeSight enables joint customers to configure policies to continuously assess endpoint compliance before granting access to corporate resources.

Protecting PHI in 7 Steps
Healthcare is data. Take these specific and practical steps for secure digital care and data protection across all your devices, no matter where they are.
.webp)
Absolute Connector for Forescout eyeSight
Get answers to commonly asked questions about the Absolute Connector for Forescout eyeSight.
Strengthening Security and Compliance Posture through Cyber Resilience in Education
Strengthening Security and Compliance Posture through Cyber Resilience in Education
Strengthening Security and Compliance Posture through Cyber Resilience in Enterprises
Strengthening Security and Compliance Posture through Cyber Resilience in Enterprises
Strengthening Security and Compliance Posture through Cyber Resilience in Healthcare
Strengthening Security and Compliance Posture through Cyber Resilience in Healthcare
Strengthening Security and Compliance through Cyber Resilience in Public Safety
Strengthening Security and Compliance through Cyber Resilience in Public Safety
Strengthening Security and Compliance Posture through Cyber Resilience
Strengthening Security and Compliance Posture through Cyber Resilience
Strengthening Security and Compliance through Cyber Resilience for Government
Strengthening Security and Compliance through Cyber Resilience for Government

Resilience for Automation 2.0: Next-Gen Endpoint Security
Unveiling Resilience for Automation 2.0: Advanced tools for endpoint visibility, patching, and compliance to strengthen your security strategy.

Microsoft Patch Tuesday August 2025: Critical Fixes and Urgent Updates
Microsoft Patch Tuesday August 2025 delivers 109 fixes, including critical vulnerabilities in MSMQ, NTLM, and graphics components. Stay protected.

Prepare for the Future of Cybersecurity with the Gartner® Leadership Vision for 2025
Discover insights from Gartner®️ 2025 Leadership Vision on transforming cybersecurity into a driver of secure digital transformation. Download now.

Microsoft Patch Tuesday July 2025: Critical Fixes and Urgent Updates
Microsoft’s July Patch Tuesday fixes 132 flaws, including 13 critical. Learn which vulnerabilities to prioritize to protect your systems and data.

Microsoft Patch Tuesday June 2025: Critical Fixes and Urgent Updates
Microsoft’s June Patch Tuesday brings 11 Critical, 56 Important fixes. Prioritize patching now to stay secure and protect your systems.

Microsoft Patch Tuesday April 2025
Microsoft’s April 2025 Patch Tuesday: 120 Fixes, Including Critical and Weaponized Threats.

Microsoft Patch Tuesday March 2025
As always, Patch Tuesday brings critical updates and security fixes to keep your systems protected.

Microsoft Patch Tuesday February 2025: 53 Fixes, Including Weaponized Threats
However, size doesn’t always equate to impact as this month’s fixes include two actively exploited vulnerabilities and two publicly disclosed ones.

What Is Cyber Resilience And How Can You Achieve It
A cyber resilient company is in the best position to prepare for, respond to, and recover from a cyberattack.

How Experts Track Stolen Laptops
At Absolute, we have the Investigations and Recovery Team to track and recover lost and stolen devices on behalf of our customers.

How Greenville Health Systems Improved Endpoint Security And Achieved Hipaa Compliance
How Greenville Health Systems Improved Endpoint Security & Achieved HIPAA Compliance

GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…
Learn some of the measures organizations must make to ensure compliance with the NIS directive.

Healthcare Top Target Data Theft
Healthcare: Top Target for Data Theft

Absolute Security Automates Remediation for CrowdStrike and other Windows BSOD Incidents
On July 19, 2024, CrowdStrike’s update caused a BSOD outage. Absolute Security provided tools to remotely repair affected endpoints and prevent future issues.

Demand for ZTNA continues its upward trajectory in 2022
With remote access becoming the norm, the priority for many IT teams has become sourcing secure access solutions that work for their teams.

Discover the State of Your Cyber Resilience
Read Absolute’s 2023 Resilience Index to learn how you can achieve cyber resilience despite complexity .

Strengthening the Compliance and Security Posture in Healthcare
With cyberattacks on healthcare up 74%, protecting patient data is more important than ever. Learn how to navigate compliance and strengthen you strategy.

Strengthening your Compliance & Security Posture for Government
Learn how government agencies can enhance compliance and cybersecurity to protect sensitive data and infrastructure.

Strengthening the Compliance and Security Posture in Public Safety
Explore top strategies to strengthen compliance and security in public safety. Learn how to build resilience against evolving cyber threats.

Strengthening the Compliance and Security Posture in Enterprise
Secure enterprise cybersecurity compliance with proven strategies to protect data and streamline risk management. Discover secure solutions for enterprise.

Enhancing IT Efficiency and Cyber Resilience Through Automation
The Automated Actions capability empowers IT and Security teams to leverage automation as part of their IT and incident response practices.

Forrester Includes Absolute Software in Security Services Edge (SSE) Landscape Report
Forrester's 2024 report highlights Absolute’s leadership in SSE, helping enterprises achieve resilience with cybersecurity and risk-based compliance strategies.

How to Achieve Cyber Resilience
How to build a resilient infrastructure that defends against attacks, zero day threats, and ensures fast recovery.

A Modern View on Achieving Risk-Based Compliance Strategy
Learn how a risk-based compliance strategy helps organizations strengthen cybersecurity in 2025.

Emergency Connectivity Fund (ECF) Asset Management and Audit Preparedness Guide
The Federal Communications Commission announced a second window to submit projects for coverage under the Emergency Connectivity Fund.

Absolute Software Guide To Understanding HIPAA Compliance
While HIPAA has been the law for some time, staying in compliance with HIPAA is an increasingly challenging endeavor as the threat landscape grows.

Creating a Cybersecurity Culture with former Arsenal F.C IT Director, Christelle Heikkila
Former Arsenal F.C IT Director, Christelle Heikkila gave a thought-provoking keynote speech to kick off our ‘CIO/CISO Roundtable on the Thames' event.

The True Challenge of School Inventory Audits
Simplify K-12 device audits with Absolute’s cybersecurity solutions. Improve accuracy, security, and efficiency for school inventory collection in 2025.

Absolute Achieves FedRAMP Ready Designation
Absolute has been designated FedRAMP Ready, at the moderate security impact level, and listed in the Federal Risk & Authorization Management Program Marketplace

Strengthening the Compliance and Security Posture in Education
Explore how schools can meet FERPA compliance and secure student data in 2025. Learn about key cybersecurity challenges and best practices for protection.

Six Steps To Effective Healthcare Data Breach Response
Effective handling of a healthcare data breach begins by acknowledging the new software-defined perimeter and the need for Zero Trust.

Ransomware Preparedness Guide for Healthcare
A Must-Have Guide for Protecting Patient Care and Critical Systems.

Public Safety
Learn how Secure Access helps over 2,500 law enforcement agencies, first responders, as well as 911 dispatch and CAD.

Federal Government
Leverage Secure Endpoint to enable a digital federal government, maintain security controls, protect sensitive public data and comply with a variety of federal data regulations.

Higher Education
Colleges and universities need to square their need for information with compliance risks and cybersecurity threats. Strike the balance with Absolute's endpoint visibility and control.

Financial
Meet internal and regulatory requirements for data security on all your devices with Absolute's powerful suite of tools.

Government
Leverage Absolute to enable a secure digital government, and increase your IT and security efficiency, accuracy and confidence. Stay compliant on all your endpoints.

K-12 Education
See, manage, control and validate appropriate usage across your entire device population — whether they're Chromebook, Windows, or Mac devices.

Healthcare
Learn how Absolute gives you the power to identify potential security threats and respond rapidly before they become security incidents that require breach notifications.

Legal
Law firms are trusted with some of their clients' most sensitive data. Protect it — and your IT assets — with Absolute's unprecedented endpoint visibility and control.

Energy Utilities
As the energy industry becomes more complex and distributed, it's more crucial than ever to see and protect all your endpoints. Learn how Absolute can help.