Tech Talks: The Future of Cyber Resilience – One Platform to Prevent, Withstand, Recover and Adapt


Join Absolute Security's Chief Product Officer, John Herrema, Chief Information Security Officer, Harold Rivas, and the product leadership team for an inside look at how industry trends, customer needs, and the evolving role of the CISO are shaping Absolute’s product vision and 2026 roadmap.
This Tech Talk highlights the drivers behind Absolute's integration of its Secure Endpoint and Secure Access solutions into a unified Cyber Resilience platform and how it stops downtime, reduces disruption, and keep organizations operational through cyber incidents.
Please ensure you watch the recording of the first Tech Talk prior to attending.
You'll learn:
- How Absolute’s own CISO and others have seen their role and focus evolve in the face of continued breaches.
- Why adding more security tools often increases risk, and how Absolute’s unified platform simplifies operations while strengthening Cyber Resilience.
- About the 'Four Steps to Cyber Resilience' and how Absolute's platform and products work together to enable:
- Unbreakable, firmware-based visibility and control.
- Assured protection through automated patching and vulnerability remediation and self-healing of critical security tools.
- Resilient, 'always on' access with 'Comply to Connect' for stronger zero trust enforcement and better user experience.
- Instant recovery of compromised or crashing endpoints.
- How the 2026 roadmap delivers on Absolute’s unified Cyber Resilience platform vision.
Don’t just manage your endpoints—make them resilient.
You can also explore our collection of customer digital event recordings to help you get the most out of Absolute Security.
Join Absolute Security's Chief Product Officer, John Herrema, Chief Information Security Officer, Harold Rivas, and the product leadership team for an inside look at how industry trends, customer needs, and the evolving role of the CISO are shaping Absolute’s product vision and 2026 roadmap.
This Tech Talk highlights the drivers behind Absolute's integration of its Secure Endpoint and Secure Access solutions into a unified Cyber Resilience platform and how it stops downtime, reduces disruption, and keep organizations operational through cyber incidents.
Please ensure you watch the recording of the first Tech Talk prior to attending.
You'll learn:
- How Absolute’s own CISO and others have seen their role and focus evolve in the face of continued breaches.
- Why adding more security tools often increases risk, and how Absolute’s unified platform simplifies operations while strengthening Cyber Resilience.
- About the 'Four Steps to Cyber Resilience' and how Absolute's platform and products work together to enable:
- Unbreakable, firmware-based visibility and control.
- Assured protection through automated patching and vulnerability remediation and self-healing of critical security tools.
- Resilient, 'always on' access with 'Comply to Connect' for stronger zero trust enforcement and better user experience.
- Instant recovery of compromised or crashing endpoints.
- How the 2026 roadmap delivers on Absolute’s unified Cyber Resilience platform vision.
Don’t just manage your endpoints—make them resilient.
You can also explore our collection of customer digital event recordings to help you get the most out of Absolute Security.
Featured speakers




Tech Talk FAQ's
Absolute Tech Talks are tactical enablement sessions including a how-to demo and Q&A on new and existing Secure Endpoint and Secure Access product features and enhancements. Absolute Tech talks are hosted by product experts across the Absolute Product Management, Product Marketing and Customer Experience teams. Email invitations to upcoming live sessions are sent to all Absolute console/portal users who are subscribed to Absolute emails. Recordings from past sessions can be accessed on this page for your convenience.
The Absolute Platform consists of three core components:
- Absolute Persistence Technology
Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.
No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.
- Absolute Resilience Technology
The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:
- Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
- Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
- Absolute Intelligence
Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.
Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Absolute Secure Endpoint is one of our company’s core product lines, which leverages the unbreakable connection provided by Absolute Persistence® to enable IT and security personnel to monitor and address computers' problems and enables the computers and their mission-critical applications to self-heal. This helps with IT management, strengthening a company’s security posture, and maintaining compliance.
Absolute Secure Access is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides resilient network connectivity for users to securely access critical resources in the public cloud, private data centers, and on-premises. These products allow users to transition from an optimized, secure tunnel to a resilient Zero Trust approach, without impairing productivity or admin controls.
Absolute Resilience for Automation is the highest product edition in the Absolute Secure Endpoint product portfolio, offering automated remediation of operating system, software and security vulnerabilities to eliminate risk and reduce an organization’s attack surface. It combines all the capabilities of Absolute Visibility™, Absolute Control™, Absolute Resilience™ and Absolute Resilience for Security™ with two critical features, Remediate and Automate.
My primary job is to give emergency crews access to critical information wherever and whenever needed so they can focus on saving lives and protecting our community. With Absolute Secure Endpoint and Absolute Secure Access, we’re able to take advantage of endpoint resilience in addition to having secure network access.