On-Demand Webinar
On-Demand Webinar
On-Demand Webinar

Tech Talks: Master Resilience for Automation: 5 Ways to Close Critical Gaps

55 mins
Section Background TextureSection Background Texture

Join Absolute product experts for a 60-minute session to discover practical, step-by-step techniques for securing and streamlining your environment using Absolute Resilience for Automation.

You’ll learn:

  • Realtime Visibility – How to continuously discover unmanaged devices, patch dark networks via Proxy Relay, and set up cache hosts for secure content delivery.
  • Attack Surface Reduction – How to automate driver and firmware updates to eliminate hidden vulnerabilities.
  • Automation – How to automatically deploy enterprise software without delays or manual intervention.
  • IT & SecOps Alignment – How to customize risk scoring and integrate data into other enterprise systems using our open API.

Don’t just manage your endpoints—make them resilient.

You can also explore our collection of customer digital event recordings to help you get the most out of Absolute Security.

Register for the webinar
Thank you!
Start Watching

Join Absolute product experts for a 60-minute session to discover practical, step-by-step techniques for securing and streamlining your environment using Absolute Resilience for Automation.

You’ll learn:

  • Realtime Visibility – How to continuously discover unmanaged devices, patch dark networks via Proxy Relay, and set up cache hosts for secure content delivery.
  • Attack Surface Reduction – How to automate driver and firmware updates to eliminate hidden vulnerabilities.
  • Automation – How to automatically deploy enterprise software without delays or manual intervention.
  • IT & SecOps Alignment – How to customize risk scoring and integrate data into other enterprise systems using our open API.

Don’t just manage your endpoints—make them resilient.

You can also explore our collection of customer digital event recordings to help you get the most out of Absolute Security.

Agenda
2 mins
Intro & Housekeeping
40 mins
Presentation & Demo
10 mins
Q&A
3 mins
Resources & Conclusion

Featured speakers

Diane Rogers
Vice President, Product Management, Absolute Security
Christopher Scott
Customer Success Manager, Absolute Security

Tech Talk FAQ's

Absolute Tech Talks are tactical enablement sessions including a how-to demo and Q&A on new and existing Secure Endpoint and Secure Access product features and enhancements. Absolute Tech talks are hosted by product experts across the Absolute Product Management, Product Marketing and Customer Experience teams. Email invitations to upcoming live sessions are sent to all Absolute console/portal users who are subscribed to Absolute emails. Recordings from past sessions can be accessed on this page for your convenience.

Absolute Secure Endpoint is one of our company’s core product lines, which leverages the unbreakable connection provided by Absolute Persistence® to enable IT and security personnel to monitor and address computers' problems and enables the computers and their mission-critical applications to self-heal. This helps with IT management, strengthening a company’s security posture, and maintaining compliance.

The Absolute Secure Endpoint product portfolio contains a variety of product packages:

Other variants, such as Absolute Resilience for Student Devices, may be offered to meet particular use cases or geographic market needs.

Customers can easily upgrade/downgrade their product subscriptions between Absolute Visibility, Control, Resilience, Resilience for Security and Resilience for Automation. Capabilities are additive and enabled via a software license key.

Absolute Ransomware Response is offered as a stand-alone solution primarily for security-conscious customers. Add-on options are offered for Absolute Control, Resilience, Resilience for Security and Resilience for Automation customers.

Absolute Resilience for Automation is the highest product edition in the Absolute Secure Endpoint product portfolio, offering automated remediation of operating system, software and security vulnerabilities to eliminate risk and reduce an organization’s attack surface. It combines all the capabilities of Absolute Visibility™, Absolute Control™, Absolute Resilience™ and Absolute Resilience for Security™ with two critical features, Remediate and Automate.

I often describe our IT toolkit as a Swiss Army knife, and Absolute Secure Access is one of the most valuable tools in it. It gives us the flexibility to meet tight deadlines, adapt to constraints, and solve problems quickly. There are so many things I no longer have to worry about thanks to Absolute Secure Access — it’s made my job significantly easier.

Steve Mikulasik - Manager, Global Network Engineering, Civeo