Insights for Endpoints FAQ

Absolute Insights for Endpoints offers IT administrators and security practitioners historical device and security trends across their endpoint environments in order to manage endpoints, maintain end user experience, and adhere with internal policies or compliance requirements for the work from anywhere environment. The product enables IT and security practitioners to build custom dashboards according to their organization’s business or compliance needs, perform data aggregations, and run queries to identify and respond to anomalies.

Absolute Insights for Endpoints is available for purchase as an add-on module. It requires an existing subscription to either the Absolute Visibility, Control, or Resilience service tier.

Absolute Insights for Endpoints is available in three distinct SKU offerings with 30-, 60-, and 90-day data storage increments. The higher data storage options are recommended for those customers requiring greater device data point retention due to the variety of IT and security use cases they want to cover/investigate.

Absolute Insights for Endpoints caters to a variety of IT and security use cases, enabling practitioners to manage devices, maintain end user experience and comply with internal policies or regulatory frameworks. Examples include tracking software rollouts and usage, proactively identifying hardware issues such as battery health or memory usage, monitoring OS patch and version status, ensuring the health of core applications such as anti-malware and VPN, and identifying vulnerable devices based on geolocation and sensitive data storage, or other risk factors.

Absolute Insights requires an existing subscription to either the Absolute Visibility, Control, or Resilience service tier. In addition, obtaining insights into various IT and security trends is dependent on the activation of the following policies through the Absolute Console. Note that the availability of these policies may differ based on service tier.

  • Hardware: captures a variety of asset inventory details across devices
  • Endpoint Data Discovery: identifies files stored on devices having sensitive data (e.g., financial details, personally identifiable information, intellectual property)
  • Full-Disk Encryption Status: captures full-disk encryption health status across devices
  • Device Usage: captures device usage metrics based on device interaction events
  • Application Health: monitors the health of mission-critical applications such as anti-malware, encryption, and VPN
  • Geolocation Tracking: captures geolocation details based on Wi-Fi triangulation, GPS location, and IP address.
  • Installed Applications: captures information about installed applications, including versions, publisher, and app usage details
  • Web Usage: identifies Web content that is most visited by users to optimize Web application licenses and identify risks associated with unsecure or unauthorized content
  • Custom Data: captures custom datapoints defined by customers using the Absolute DataExplorer tool

Customers can customize dashboards by choosing from a number of visualization types (e.g., table, pie, bar, line chart, etc.), modifying the applicable time period (e.g., month, week, day, or hour), and adding targeted filters (e.g., devices, apps, users, etc.) to gather insights based on specific needs.

Examples of scenarios where leveraging filters to acquire specific device or security related information might be helpful, includes the following:

  • Identify devices in Victoria, B.C. that were unencrypted between Jan 15 to Feb 15, 2022
  • View versions of a specific app installed across device population (e.g., Firefox)
  • Remove pre-built Windows apps (Photos) from appearing on “Applications Installed” visualization
  • View IT and security insights for devices in Los Angeles only

Customers can indeed aggregate multiple datasets through targeted commands such as sum, count, mean, median, top values, etc. to identify anomalies and potential device or security risks to ensure they don’t develop into more serious events.

Financial Services