Secure Endpoint

Secure Access

Compare Absolute Product Packages

Choose the Absolute product package that provides the solutions your organization needs.

  Absolute Visibility Absolute Control Absolute Resilience
 

Serves as your source of truth for device and application health.


Provides you a lifeline to protect at-risk devices and data.

Delivers application self-healing and confident risk response.
Track hardware      
Report and alert on hundreds of hardware attributes
OS Support:
Monitor device leasing reports
OS Support:
Track new device activations and connection history
OS Support:
Leverage pre-built and custom reports
OS Support:
Flag missing devices and be alerted when they connect to the internet
OS Support:
Track Installed Software      
Report on installed software by device or population
OS Support:
Capture Device Insights      
Collect Absolute defined data points from the DataExplorer Library1
OS Support:
Configure the collection of custom data points tailored to specific needs using the DataExplorer Builder
OS Support:
Assess Device Security Posture      
Encryption status reporting
OS Support:
2
Anti-malware status reporting
OS Support:
Measure Device Usage      
Assess device usage by analyzing login/unlock and device interaction events
OS Support:
Report on average daily usage by device
OS Support:
Report on visited websites and understand the ROI from Web Apps in your environment3
OS Support:
Identify Sensitive Files On Devices      
Discover PII, PHI, PFI, SSN, GDPR data and Intellectual Property on/off network
OS Support:
Perform data risk assessment with estimated cost exposure
OS Support:
Identify devices with sensitive files syncing with cloud storage (Dropbox, iCloud, Box, OneDrive)
OS Support:
Monitor Device Location      
Track device location with 365 days of history
OS Support:
Define geofences to detect unauthorized device movement
OS Support:
Remotely Freeze Devices      
Freeze a device with custom message – scheduled or on demand
OS Support:
Set an offline timer to automatically freeze devices
OS Support:
Freeze a device via the firmware for an extra layer of protection4
OS Support:
4
Remotely Delete Data From Devices      
Selectively delete files
OS Support:
Perform an end-of-life device wipe with compliance certificate
OS Support:
Enable Firmware Protection      
Manage supervisor password at scale5
OS Support:
Secure, On-Device End User Communications      
Inform users by displaying important messaging on their devices’ screen or to solicit feedback
OS Support:
Query and Remediate Devices Immediately at Scale      
Run 130+ prebuilt workflows from Reach Library
OS Support:
Run Custom Powershell or BASH scripts on devices
OS Support:
6
Application Health Reporting      
Monitor basic application health parameters across 2,000 Windows and Mac business, productivity, and security apps to detect any failures and self-mitigate.7
OS Support:
Advanced monitoring of the application health of a select group of mission-critical security apps with automated mitigation capabilities.8
OS Support:
Self-healing of mission-critical applications covered in the Application Resilience Catalog8      
Check out the Absolute Application Resilience catalog to find out the range of mission-critical applications covered9
OS Support:
Other applications10
OS Support:
Investigate and Recover Stolen Devices      
Recover stolen devices
OS Support:
Service Guarantee for devices not recovered11 (Education only)
OS Support:
Absolute Platform Components      
Absolute Persistence
OS Support:
Rules & Policy Engine
OS Support:
Alerts
OS Support:
Dashboards
OS Support:
API Library13
OS Support:
Cloud-based console
OS Support:
Predefined and customized alerts
OS Support:
Universal SIEM connector
OS Support:
Role-based access control
OS Support:
Single sign-on
OS Support:
2-factor authentication
OS Support:
Absolute Connector for ServiceNow®
OS Support:
Accelerated Device Actions14
OS Support:
  Visibility Control Resilience

Download the Full Product Comparison Chart | View features for Chromebooks

Security Focused Product

Ransomware Response

Absolute Ransomware Response enables organizations to assess their endpoint ransomware preparedness, monitor their endpoint cyber hygiene, and expedite ransomware recovery.


Learn more

  Absolute Core Absolute Edge
  Deliver an optimized secure tunnel for today’s modern workforce Assure Zero Trust Network Access with optimized user experience
Actively improve the employee experience
Always-on connectivity, using tunnel and network session resilience (patented Network Resilience technology)
Video and audio optimizations
Secure application access via mobile-first tunnel
Offering a smoother transition to ZTNA
Full visibility outside of the corporate perimeter
Powerful policy and prioritization engine
Patented dynamic access policies that are enforced at the endpoint
Real-time risk assessment
Restrict access to enterprise resources, no matter where they’re hosted
Patented, proactive diagnostics on device and network
Network performance analytics outside the corporate perimeter; from cellular to public Wi-Fi
Real-time geolocation dashboards
Customizable dashboards
Deliver a secure browsing experience for all by leveraging
  • multiple anti-virus scans
  • remote browser isolation
  • content disarm and reconstruction
  • data loss prevention

Buy through our partners

Our system manufacturer partners, certified network of distributors, telecom carriers, and value-added resellers are here to help you to purchase and successfully deploy Absolute’s self-healing, intelligent security solutions.

Find a Channel Partner

Take action and learn more

Like what you're hearing?

We’d love to show you how Absolute can secure and empower your organization.

Looking for more information? Join a product overview webinar

Secure Endpoint

Mitigating Zero-Day Threats in a Complex Cybersecurity Landscape

Live Webinar - Sept 17, 2024 | 9AM PT

Secure Access

Leveraging AI to Protect Against Modern Cybersecurity Threats

Live Webinar - Oct 1, 2024 | 9AM PT

View all

Financial Services