Absolute Security Blog
Get expert insights on endpoint resilience, Zero Trust, ransomware defense, digital transformation, and more—so you can stay ahead of what’s next.
Most Recent
AI Moves Faster than Security, CISOs Say Resilience is Way Forward

AI Moves Faster than Security, CISOs Say Resilience is Way Forward
With organizations embracing AI, Absolute Security’s newest survey of 500 U.S.-based CISOs revealed alarming and unexpected findings.
April 17, 2025
Microsoft Patch Tuesday April 2025

Microsoft Patch Tuesday April 2025
Microsoft’s April Patch Tuesday: 120 Fixes, Including Critical and Weaponized Threats.
April 8, 2025
Microsoft Patch Tuesday March 2025

Microsoft Patch Tuesday March 2025
Here’s a breakdown of the most significant issues and why you should prioritize addressing them immediately.
March 11, 2025
Absolute Enhances Zero Trust with Secure Access App Connectors

Absolute Enhances Zero Trust with Secure Access App Connectors
Enhancements to Secure Access for fast, end-to-end zero trust connectivity and security to public/private clouds and data centers.
Bryan Embrey
•
April 22, 2025
Add title here
Add title here
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Et ille ridens: Video, inquit, quid agas; Cur, nisi quod turpis oratio est? Duo Reges: constructio interrete. Tu quidem reddes; Oratio me istius philosophi non offendit;
Add title here
Add title here
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Et ille ridens: Video, inquit, quid agas; Cur, nisi quod turpis oratio est? Duo Reges: constructio interrete. Tu quidem reddes; Oratio me istius philosophi non offendit;
Featured Posts
Absolute Enhances Zero Trust with Secure Access App Connectors

Absolute Enhances Zero Trust with Secure Access App Connectors
Enhancements to Secure Access for fast, end-to-end zero trust connectivity and security to public/private clouds and data centers.
Bryan Embrey
•
April 22, 2025
AI Moves Faster than Security, CISOs Say Resilience is Way Forward

AI Moves Faster than Security, CISOs Say Resilience is Way Forward
With organizations embracing AI, Absolute Security’s newest survey of 500 U.S.-based CISOs revealed alarming and unexpected findings.
April 17, 2025
Debunking Myths About Secure Access Solutions

Debunking Myths About Secure Access Solutions
We’d like to set the record straight with facts about the strengths of our solution and why we’re still the cornerstone technology and trusted choice for over 2,500 Public Safety and First Responder organizations worldwide for over two decades.
February 6, 2025
Enhancing IT Efficiency and Cyber Resilience Through Automation

Enhancing IT Efficiency and Cyber Resilience Through Automation
The Automated Actions capability empowers IT and Security teams to leverage automation as part of their IT and incident response practices to boost efficiency and cyber resilience.
November 20, 2024
Add title here
Add title here
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Et ille ridens: Video, inquit, quid agas; Cur, nisi quod turpis oratio est? Duo Reges: constructio interrete. Tu quidem reddes; Oratio me istius philosophi non offendit;
Add title here
Add title here
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Et ille ridens: Video, inquit, quid agas; Cur, nisi quod turpis oratio est? Duo Reges: constructio interrete. Tu quidem reddes; Oratio me istius philosophi non offendit;
Blog Library
Oops! Something went wrong while submitting the form.
No results found.
There are no results with this criteria. Try changing your search.

Expert Insights
Answers To Today's Toughest Endpoint Security Questions In The Enterprise
Knowing whether or not their endpoint security strategies are working keeps #CIOs up at night. Because you can't secure what you can't see, you need an undeletable tether.
August 10, 2020
Endpoint Resilience
Data Protection
IT Asset Management

Expert Insights
5 Things to Look Out for to Avoid Buying a Stolen Laptop
Avoid buying a stolen laptop by knowing the red flags and understanding the risks to your data and security. Follow these 5 tips to stay protected.
July 28, 2020
Endpoint Resilience
Data Protection
Threat Protection

Products & Solutions
Improving Online Learning Experiences One Secured Endpoint At A Time
How leading K12 educators are bringing together the latest cloud and autonomous endpoint security technologies to help students with remote learning.
July 22, 2020
Data Protection
Endpoint Resilience
Application Resilience

Products & Solutions
Making A Summer Plan for Student-Held Devices
For the districts who decided to leave devices with students for the summer, what should be done to ensure a smooth experience this fall? Absolute customers have the tools needed to support safe, effective learning, no matter where the devices are.
July 17, 2020
Endpoint Resilience
Data Protection
IT Asset Management

Expert Insights
Absolute Software Guide To Understanding HIPAA Compliance
While HIPAA has been the law for some time, staying in compliance with HIPAA is an increasingly challenging endeavor as the threat landscape grows.
June 19, 2020
Compliance
Data Protection
Endpoint Resilience

Expert Insights
5 Steps To Streamline Student Device Collection
Simplify your K-12 device collection process with Absolute. Secure, track, and recover devices remotely with an easy-to-use platform that boosts efficiency.
June 16, 2020
Data Protection
IT Asset Management
Endpoint Resilience

Products & Solutions
How To Protect Your Data If A Laptop Is Lost Or Stolen
When a laptop goes missing, sensitive data is at risk. Follow these key steps to protect your information and reduce the impact of device theft or loss.
June 3, 2020
Data Protection
Endpoint Resilience
IT Asset Management

Products & Solutions
How To Guide Tracking and Recovering Laptops
Discover proven strategies to track, recover, and secure your lost or stolen laptop, ensuring your data stays protected.
May 28, 2020
Recover Missing Devices
Endpoint Resilience
Data Protection

Customers
How Duarte Unified School District Manages Remote Learning With Absolute
When the COVID-19 outbreak hit and forced a new and unexpected learn-from-home environment on everyone, Duarte USD had to make some quick decisions including what constitutes effective and efficient web usage.
May 20, 2020
Endpoint Resilience
Data Protection
Access Resilience

Expert Insights
Embrace The Shadow It Mindset Not The Shadow
It may sound like a clandestine mission or something out of crime drama, but Shadow IT is actually a very common, everyday occurrence. And it has been happening in organizations (yours included) for decades.
April 14, 2020
Threat Protection
Shadow IT
Application Resilience
Resilience

Products & Solutions
Strengthening Device Management And Endpoint Security Just Got Easier With Absolute Power Of Resilience
This week, we announced that the power of Absolute’s Resilience solution and patented Absolute® Persistence™ technology now extends to more than 30 critical security applications.
February 5, 2020
Data Protection
Endpoint Resilience
Application Resilience

Customers
Apria Healthcare Sees And Secures 8 000 Devices With Absolute
With Absolute Persistence already installed in the BIOS of their endpoint devices, Apria found unbreakable endpoint visibility and control by simply turning Persistence on.
January 16, 2020
Endpoint Resilience
Data Protection
IT Asset Management

Products & Solutions
Tracking Recovering Missing Devices After The Holidays
Not only is the holiday season prime time for thieves to stock up on valuable electronics left in airports, vehicles and cafes, but it’s also common for students and staff to misplace school-owned devices at home or while traveling.
January 7, 2020
Recover Missing Devices
Data Protection
Endpoint Resilience

Inside Absolute
Absolute Ceo Christy Wyatt Recognized As Top 50 Women Leaders In Saas Of 2019
We’d like to congratulate all the 2019 leader awardees and give a special shout out to one honoree in particular – our CEO Christy Wyatt.
October 30, 2019
Data Protection
Endpoint Resilience
Resilience

Inside Absolute
Absolute Named Leader In G2 Fall 2019 Grid Report For Endpoint Management
Thanks to high levels of customer satisfaction and positive reviews from verified users, G2 has - for the second time this year - named Absolute a leader in the Fall 2019 Grid Report for Endpoint Management Software.
October 18, 2019
Data Protection
Endpoint Resilience
Recover Missing Devices

Expert Insights
What Is Cyber Resilience And How Can You Achieve It
A cyber resilient company is in the best position to prepare for, respond to, and recover from a cyberattack. Being resilient, however, means much more than attack prevention or response.
September 20, 2019
Compliance
Endpoint Resilience
Resilience

Expert Insights
4 Recent Data Breaches That Originated On The Endpoint
As data breaches become more frequent, organizations must focus on securing endpoints to prevent vulnerabilities and mitigate the risks of costly breaches.
August 26, 2019
IT Asset Management
Endpoint Resilience
Threat Protection

Products & Solutions
Quantifying K 12 Device Use With Absolute
Discover how Loudoun County Public Schools boosted device utilization and security for personalized learning using Absolute’s endpoint protection and tracking.
July 12, 2019
Data Protection
Endpoint Resilience
IT Asset Management

Products & Solutions
What Is Endpoint Management
Effective endpoint management is key to securing devices and sensitive data. Discover why managing endpoints is critical for staying ahead of evolving cyber threats.
March 1, 2019
Data Protection
Endpoint Resilience
Threat Protection

Customers
How L A Tourism Secures A Distributed Workforce
The structure of work is changing rapidly. Driven by technology advancement, a global economy and a constant push for more productivity, there is a fast-moving trend toward enabling a distributed workforce.
February 11, 2019
Data Protection
IT Asset Management
Remote Work
Sorry, no items found...