Cyber Resilience Products Endpoint Security

Introducing New Resilience Capabilities to Strengthen Endpoint Cyber Resilience While Reducing Cost and Complexity

January 27, 2025

5 Min Read

Cyber Resilience IS The New Imperative

Remote and hybrid work, combined with an expanding network of partners and suppliers, has amplified organizations’ exposure to cyber risks. Threat actors increasingly exploit vulnerabilities, misconfigurations, and blind spots to successfully execute ransomware or other attacks. With all this complexity, organizations must enforce cyber resilience across their endpoints and digital environment to both minimize the attack surfaces and ensure rapid recovery from disruptions. Furthermore, IT and security teams face mounting pressure to reduce costs and improve efficiencies, amplifying the need for consolidation, automation, and rapid recovery as part of an organization’s security operations and incident response practices. 

Bridging the Vulnerability Gap

Vulnerabilities can originate from several sources within an organization’s perimeter. Examples include security flaws in software and operating systems that haven't been addressed by patches or other remediations, weak or reused passwords, overly broad privileges, and improperly configured network settings or firewall rules that create openings for hackers to penetrate and spread throughout the system. On average, it takes 5 days1 for threat actors to weaponize disclosed vulnerabilities and typically 77 days for the average organization to remediate through a patch deployment2. Hence, there is a clear gap in identifying and responding to security issues in an efficient and timely manner to limit the organization’s exposure and attack surface. 

If an endpoint’s security perimeter is breached, IT and security teams require the means to restore compromised devices back to a fully trusted state of compliance and productive operation. This may include fully restoring to a trusted image or more surgical actions such deleting malicious files or repairing registry settings or other configurations that may have caused the issue. Additionally, to avoid costly down time these steps need to be executed remotely, automatically, and at scale without requiring devices to be shipped back to IT or relying on techniques such USB recovery drive, both of which are costly, time-consuming, and not practical when large numbers of users and devices are in remote locations.

Introducing Absolute’s New Resilience Modules

To address these challenges, Absolute Security is proud to announce the availability of four new product modules: A unique Rehydrate solution, as well as market-leading Patch, Remediate, Automate features. These exciting capabilities empower organizations to apply cyber resilience across their corporate environment through proactive and remedial measures to guard against and respond to IT issues or cyberattacks. The new modules are available in our Absolute Resilience, Absolute Resilience for Security and Absolute Resilience for Automation editions

  • Rehydrate: Available in our current Absolute Resilience offering, Rehydrate enables “one-click” remote recovery and repair of OS and applications, even when systems are compromised. Leveraging Absolute’s firmware-based persistence, IT teams can execute restoration or targeted repairs remotely and at scale, avoiding costly downtime and shipping delays. Rehydrate is currently offered as a Tech Preview for select customers, but will be included with the Absolute Resilience, Absolute Resilience for Security and Absolute Resilience for Automation editions in the coming months.
  • Patch: Available in the new Resilience for Security edition, Patch simplifies vulnerability scanning and automates patch management for OS and 3rd-party apps across Windows, Mac, and Linux. This proactive approach reduces the attack surface and ensures compliance.
  • Remediate: Available in the new Resilience for Automation offering, Remediate scans for and resolves security vulnerabilities, misconfigurations, and authorization issues with prebuilt workflows, empowering teams to address exposures at the push of a button.
  • Automate: Also available in the new Resilience for Automation offering, Automate introduces a no-code workflow builder, enabling IT teams to create custom remediation workflows without advanced coding expertise. This tool ensures endpoints remain secure, compliant, and performant.

A Consolidated, Unified Platform

The Absolute Resilience Platform, embedded in more than 600 million endpoints, integrates the new patch, remediation, automation, and rehydrate features with Absolute’s existing visibility, control, application resilience, and self-healing features. Configuration, policy definition, reporting and other management operations and workflows are orchestrated through a single cloud-based console. The platform also leverages the always-on connection provided by Absolute Persistence® technology.

This unified approach improves overall resilience, ensures endpoints are always on, up-to-date, and fully operational, and strengthens the security posture while reducing complexity and costs. Organizations can have the peace of mind knowing they can respond efficiently whenever cyberattacks or IT issues cause unexpected disruption to business operations.

Absolute Security offers a simplified, cost-effective, and improved approach to endpoint security and management. Oue telemetry demonstrates that, when underpinned by Absolute Resilience, customers’ mission-critical IT and security applications meet compliance and performance standards close to 100 percent of the time.

Learn More

For more information about these exiting new capabilities, check out the following:

Sources:

  1. How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends
  2. The State of 2025 REPORT Patch Management - Adaptiva
Cyber Resilience Products Endpoint Security

Share this article

Financial Services