Absolute Tech Talks

In-console demos with tips and tricks for getting the most value out of Absolute.

Tech Talk FAQs

Absolute Tech Talks are tactical enablement sessions including a how-to demo and Q&A on new and existing Secure Endpoint and Secure Access product features and enhancements. Absolute Tech talks are hosted by product experts across the Absolute Product Management, Product Marketing and Customer Experience teams. Email invitations to upcoming live sessions are sent to all Absolute console/portal users who are subscribed to Absolute emails. Recordings from past sessions can be accessed on this page for your convenience.

The Absolute Secure Endpoint product portfolio contains a variety of product packages:

  • Absolute Visibility is the entry service tier in the Absolute Secure Endpoint portfolio. Absolute Visibility collects data about the endpoints' location, security posture, and hardware/software inventory. It provides analysis of software, Web applications, and hardware utilization as well as identifies potential failure points, sensitive data, and suspicious use patterns.
  • Absolute Control is the mid-service tier in the Absolute Secure Endpoint portfolio. Absolute Control adds to Absolute Visibility’s capabilities to control endpoints over the Internet, allowing for critical functions such as remote file deletion and data wipe, freezing devices on demand when at-risk, end user messaging, as well as establishing geo-fences and alerts.
  • Absolute Resilience is the top service tier in the Absolute Secure Endpoint product portfolio and the most popular package among customers. Compared to Absolute Control, it adds further capabilities to secure endpoints from threats and vulnerabilities, respond to security breaches and incidents, and enable Application Resilience to automatically monitor and detect unhealthy applications and automatically heal them.
  • Absolute Ransomware Response is a stand-alone offering, which provides capabilities and services to assess an organization's ransomware preparedness and cyber hygiene across endpoints; ensures mission-critical security applications such as anti-malware and device management tools remain healthy and capable of self-healing; and expedites the quarantine and recovery of endpoints if a ransomware attack occurs.

Other variants, such as Absolute Resilience for Student Devices, may be offered to meet particular use cases or geographic market needs.

Absolute Secure Access encompasses three products:

  • Absolute Core provides security and confidentiality for data in motion by means of encryption and access controls. It also offers benefits to the end user, such as making tunnel and network sessions resilient and optimizing streaming video and audio.
  • Absolute Edge provides a software-defined perimeter via Zero Trust Network Access, creating a context-based, logical access boundary around an application or set of applications – wherever they're hosted. It shields applications from the Internet, making them invisible to unauthorized users. Access policies are enforced at the endpoint, avoiding latency and any data transgression.
  • Absolute Insights for Network™ offers diagnostic and experience monitoring capabilities across endpoints and network, allowing organizations to proactively monitor, investigate, and remediate end user performance issues quickly and at scale, even on networks that are not company-owned or managed.

Absolute Secure Access packages are offered in two flavors, Absolute Core™ and Absolute Edge™ (formerly called Complete) with the included products as outlined below. Regional variations might be available.

  • Absolute Core
    • Secure, optimized tunnel
    • Policy enforcement
    • Network Access Control (NAC)
  • Absolute Edge
    • Includes Absolute Core
    • Absolute ZTNA
    • Absolute Insights for Network

For Absolute Edge customers, Absolute offers the Absolute Secure Web Gateway Service (powered by Ericom) add-on module that tightly integrates with the extensive policy capabilities in Absolute Secure Access. It strengthens an organization’s security posture while improving end user experience.

G2 names Absolute a Leader in Zero Trust Networking

G2 Leader Mid-Market Winter 2024 G2 Crowd Leader Winter 2024 G2 Momemtum Leader Winter 2024 G2 Leader Enterprise Winter 2024 G2 Best Relationship Winter 2024 G2 Leader Americas Winter 2024 G2 Users Love Us

Hear from your peers in the G2 Winter 2024 Report for Zero Trust Networking Software.

Download the Report

Financial Services