Products & Solutions

Products & Solutions empower businesses with cutting-edge security and resilience tools. Here, you’ll find blog posts packed with expert insights on Absolute’s technology and capabilities.

Explore our Blog Library

Topic
Oops! Something went wrong while submitting the form.
Filtering by:
Text
No results found.
There are no results with this criteria. Try changing your search.
The Critical Role of Endpoint Resilience In A COVID-19 World
Work-from-home setup—emphasizing productivity and secure connections.
Products & Solutions

The Critical Role of Endpoint Resilience In A COVID-19 World

Absolute is committed to doing its part in helping enterprise and educational institutions enhance their security postures amid COVID-created remote work and distance learning.
Data Protection
Endpoint Resilience
Application Resilience
Absolute Launches Device Collection Service
Student typing on laptop—enabling secure and flexible remote learning.
Products & Solutions

Absolute Launches Device Collection Service | Blog | Absolute Security

Absolute can help make your school district’s device collection season as painless and hassle-free as possible.
Data Protection
Endpoint Resilience
Recover Missing Devices
Improving Online Learning Experiences One Secured Endpoint At A Time
Young student on laptop—emphasizing digital literacy and safe learning.
Products & Solutions

Improving Online Learning One Secured Endpoint at a Time

How leading K12 educators are bringing together the latest cloud and autonomous endpoint security technologies to help students with remote learning.
Data Protection
Endpoint Resilience
Application Resilience
Making A Summer Plan for Student-Held Devices
Laptop in sunlight—highlighting device security during mobile summer work.
Products & Solutions

Making a Summer Plan for Student-Held Devices

For the districts who decided to leave devices with students for the summer, what should be done next to ensure a smooth learning experience this fall? Absolute customers already have the tools needed to support safe, effective learning, no matter where the devices are.
Endpoint Resilience
Data Protection
IT Asset Management
How To Guide Tracking and Recovering Laptops
Open window and missing laptop—conveying data loss from theft.
Products & Solutions

How to Guide: Tracking & Recovering Laptops

Your data is at risk. Everyone—should know how to track, find, recover, or erase a laptop if needed.
Recover Missing Devices
Endpoint Resilience
Data Protection
Strengthening Device Management And Endpoint Security Just Got Easier With Absolute Power Of Resilience
Generic office image—representing secure corporate work environments.
Products & Solutions

Strengthening Device Management & Endpoint Security

This week, we announced that the power of Absolute’s Resilience solution and patented Absolute® Persistence™ technology now extends to more than 30 critical security applications – including, most recently, VMware® Carbon Black and Workspace OneTM as well as Crowdstrike® Falcon.
Data Protection
Endpoint Resilience
Application Resilience
Quantifying K 12 Device Use With Absolute
K-12 classroom computers—representing cybersecurity in education systems.
Products & Solutions

Quantifying K-12 Device Use with Absolute Security

Using Absolute, LCPS was able to provide quantitative information on device utilization rates right away.
Data Protection
Endpoint Resilience
IT Asset Management
How To Manage End-Of-Year Device Collection Chaos
Laptop on beach chair—showcasing endpoint security during summer breaks.
Products & Solutions

How to Manage End-Of-Year Device Collection Chaos

Device collection is a challenge — particularly in a school year that demanded remote learning. We have solutions to help you track down your student devices with ease.
Recover Missing Devices
Data Protection
IT Asset Management
What Is Endpoint Management?
Digital interface concept—representing transformation and cyber innovation.
Products & Solutions

What is Endpoint Management? | Blog | Absolute Security

Endpoint management ensures secure connections between devices and networks, protecting against cyber threats. Learn why it’s critical to safeguard your endpoints in today’s digital world.
Data Protection
Endpoint Resilience
Threat Protection
How Experts Track Stolen Laptops
Hacked system alert—illustrating consequences of compromised security.
Products & Solutions

How the Experts Track Stolen Laptops | Blog | Absolute Security

At Absolute, we have the Investigations and Recovery Team to track and recover lost and stolen devices on behalf of our customers. Since the team’s formation in 1993, we have helped customers around the globe recover more than 50,000 lost or stolen laptops over the years. In FY2018 alone, the team investigated more than 15,000 laptop incidents and successfully recovered 67% of them.
Endpoint Resilience
IT Asset Management
Compliance
How To Protect Your Data If A Laptop Is Lost Or Stolen
Close-up of modern laptop—representing endpoint protection in business.
Products & Solutions

How to Protect your Data if a Laptop is Lost or Stolen

When a device goes missing, so does all of the sensitive data that resides on it. Do you have a plan in place for tracking devices and securing your information?
Data Protection
Endpoint Resilience
IT Asset Management
Absolute Security Automates Remediation for CrowdStrike and other Windows BSOD Incidents
Blue Screen of Death (BSOD) error on a computer screen
Products & Solutions

Absolute Remediates CrowdStrike and Other BSOD Incidents

On July 19, 2024, CrowdStrike’s update caused a BSOD outage. Absolute Security provided tools to remotely repair affected endpoints and prevent future issues.
Endpoint Resilience
Compliance
Resilience
Sorry, no items found...