Unparalleled Persistence Leadership: What Sets Absolute Security Apart

White Paper
What is Absolute Persistence and how is it unique? Get answers to these and other relevant questions about how this differentiated technology empowers organizations to be resilient against cyber threats and in turn, stop downtime.

Unparalleled Persistence Leadership: What Sets Absolute Security Apart

What is Absolute Persistence and how is it unique? Get answers to these and other relevant questions about how this differentiated technology empowers organizations to be resilient against cyber threats and in turn, stop downtime.

Absolute Security’s patented Persistence technology delivers enterprise-grade, 30+ year mature and widely supported firmware persistence and self-healing to endpoints and applications. It is device vendor agnostic so is tailored towards the needs of Enterprise organizations with mixed device fleets.

Key Highlights:

  • How Absolute Persistence offers enterprise grade self-healing to endpoints and applications
  • Specific capabilities and differentiators delivered through Persistence technology
  • How Persistence is unique and different from other endpoint solutions tied to the firmware

Learn how Absolute Persistence technology helps organizations maintain endpoint visibility, control and resilience to stop downtime.

FAQs

Absolute Persistence® is unique, patented technology embedded in the firmware of 600+ million devices that provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint. The Persistence technology is installed in the firmware of most endpoint devices at the factory. Each device leaves the factory with the Persistence technology in place, waiting to be activated. Activation occurs when a customer purchases an Absolute product that supports Persistence and installs the necessary software agent.

All Absolute products support Persistence technology. The software agent is installed on computers in the operating system by running an installer or when the device is imaged. The software agent sends information from each device to the Absolute Platform for IT administrators and security professionals to assess risks and to take appropriate action.

The Absolute Agent makes regularly scheduled calls over the Internet to the Absolute Platform, where customers access their account via the cloud-based Absolute Console. Telemetry collected includes device, data, application, and user information. Customers can define conditions and receive alerts if the conditions occur, allowing them to respond immediately to any potential security incident. The software agent also supports remote actions such as the running of scripts through Absolute Reach™ and self-healing of critical security applications through Application Resilience™.

Persistence technology is factory-embedded into the core of most endpoint devices. Once activated, it gives you unrivalled visibility and control to confidently manage your endpoints, protect at-risk data, as well as investigate and remediate potential threats. Persistence is the only firmware-embedded solution that will survive attempts to disable it, even if the device is reimaged, the hard drive is replaced, or the firmware is updated.

Through our partnership with system manufacturers, the Persistence technology is embedded in the firmware of endpoint devices at the factory. Persistence leverages Absolute’s secure channel from the cloud-based console down to the firmware. In doing so, it maintains an always-on digital tether between device and Absolute Console, ensuring two-way communication so you can reliably query information and run actions remotely.

Persistence technology remains dormant in the firmware until the Absolute Agent is installed. Once the Absolute Agent is installed, it initiates a call to the Absolute Platform and Persistence is then activated. This means that the status of the software agent is monitored and if it is missing, a reinstallation will automatically occur.

No. If the Persistence technology has been enabled, the self-healing capability will repair the Absolute Agent, or any other applications supported by Application Resilience™. The computer will still be protected. The enable/disable state of the Persistence technology is stored in a part of the BIOS that cannot be flashed to remove it.

The communication between the software agent and the Absolute Platform is encrypted. Optionally, you can also enable FIPS-140 certified communication. The Federal Information Processing Standard (FIPS) Publication 140-2 is a US government security standard that specifies the security requirements for cryptographic modules protecting sensitive information. The National Institutes of Standards and Technology (NIST) publishes the list of vendors with validated FIPS 140-1 and 140-2 cryptographic modules. The Absolute Encryption Engine is validated FIPS 140-2.

Testimonial Image

We had layers of complexity in managing all our assets. This is why we invested in Absolute. It is the first thing we put on every endpoint and now, we’re able to swiftly manage asset count and identify locations.

Anil Nomula - IT Manager, Genpact