Automated Actions


Join Absolute product experts to learn about the Automated Actions functionality available to Absolute Endpoint customers on Control and Resilience editions.
You’ll learn:
- What Automated Actions can do
- How to create an Action Rule in the Secure Endpoint console
- How to find results of a completed automated action
- What automation best practices are
This 60-minute session includes an overview of the functionality available through Automated Actions in your console including an in-depth demonstration. Following the demonstration there will be a dedicated Q&A session with our product experts!

Featured Speakers


Tech Talks FAQ
Absolute Tech Talks are tactical enablement sessions including a how-to demo and Q&A on new and existing Secure Endpoint and Secure Access product features and enhancements. Absolute Tech talks are hosted by product experts across the Absolute Product Management, Product Marketing and Customer Experience teams. Email invitations to upcoming live sessions are sent to all Absolute console/portal users who are subscribed to Absolute emails. Recordings from past sessions can be accessed on this page for your convenience.
The Absolute Secure Endpoint product portfolio contains a variety of product packages:
- Absolute Visibility
- Absolute Control
- Absolute Resilience
- Absolute Resilience for Security
- Absolute Resilience for Automation
- Absolute Ransomware Response
Other variants, such as Absolute Resilience for Student Devices, may be offered to meet particular use cases or geographic market needs.
Customers can easily upgrade/downgrade their product subscriptions between Absolute Visibility, Control, Resilience, Resilience for Security and Resilience for Automation. Capabilities are additive and enabled via a software license key.
Absolute Ransomware Response is offered as a stand-alone solution primarily for security-conscious customers. Add-on options are offered for Absolute Control, Resilience, Resilience for Security and Resilience for Automation customers.

I was really impressed with Absolute’s ability to see any device and remotely freeze or wipe it, as well as to monitor and prove encryption status. Field officers also need uninterrupted access to crucial data to make the right decision on the appropriate protocol in seconds, so keeping their computers up and running with Absolute Secure Endpoint could save their lives.