Absolute Security Showcases Next Generation Cyber Resilience at Black Hat USA 2024

August 06, 2024

New Remote Rehydration Capability Automates Recovery and Remediation for Ransomware, BSOD, and other Disruptions

SEATTLE & LAS VEGAS – Absolute Security will demonstrate the next generation of Cyber Resilience at Black Hat USA 2024 in Las Vegas. During the conference, CISOs and other security and risk professionals responsible for protecting their organizations against threats and disruptions are invited to hosted demonstrations of the Absolute Cyber Resilience Platform in the Business Expo Hall, booth #4312.

Entrenched remote and hybrid work models make it increasingly difficult for organizations to maintain visibility and control over PCs. AI and other innovations are requiring enterprises to accelerate new deployments and upgrades of millions of devices. Technical complexity and intensifying threats are disrupting business and causing security controls to fail at alarming rates. These and other factors are driving security and compliance risk to an all-time high.

The Absolute Cyber Resilience Platform is purpose-built to meet these challenges. Unique, firmware-based remote capabilities provide essential security, compliance, and business continuity benefits that modern enterprises need to thrive in today’s digital world. Visit the Absolute Security booth to learn more about key capabilities and benefits provided by the Absolute Cyber Resilience Platform, including:  

  • Remote Endpoint Rehydration: Customers disrupted by Blue Screen of Death (BSOD) incidents, malware attacks, including ransomware, unauthorized access, other threats, and technical errors can detect and remove corrupted files and threats from devices, restore them to an operational state, and rehydrate the operating system and all security and productivity applications via a fully remote, one-click process.
  • Visibility and Control: Customers maintain constant visibility and control over PC fleets and receive comprehensive intelligence on device security posture to establish a Comply-to-Connect, Zero Trust model. This ensures that only endpoints compliant with security policies can connect to corporate networks, assets, and data.

  • Cyber Resilience: Customers ensure that endpoint security controls maintain efficacy and compliance with security policies. This not only reduces the risk of threat detection and prevention failures, but also stops unauthorized access attempts while maintaining resilient network connectivity.

“Accelerating threats, remote and hybrid work, complexity, and technical errors are causing crippling BSOD events and other costly disruptions,” said John Herrema, Chief Product Officer, Absolute Security. “Absolute’s unique cyber resilience capabilities are already embedded in more than half a billion leading PCs. Customers that have activated us are operating their businesses with the assurance that they’ve reduced the risk of being paralyzed by a costly outage or falling victim to a cyber attack.”

Share this article

About Absolute Security

Absolute Security is partnered with more than 28 of the world’s leading endpoint device manufacturers, embedded in the firmware of 600 million devices, trusted by thousands of global enterprise customers, and licensed across 16 million PC users. With the Absolute Security Cyber Resilience Platform integrated into their digital enterprise, customers ensure their mobile and hybrid workforces connect securely and seamlessly from anywhere in the world and that business operations recover quickly following cyber disruptions and attacks. Our award-winning capabilities have earned recognition and leadership status across multiple technology categories, including Zero Trust Network Access (ZTNA), Endpoint Security, Security Services Edge (SSE), Firmware-Embedded Persistence, Automated Security Control Assessment (ASCA), and Zero Trust Platforms. To learn more, visit www.absolute.com and follow us on LinkedIn, X, Facebook, and YouTube.

ABSOLUTE SECURITY, ABSOLUTE, the ABSOLUTE LOGO, AND NETMOTION are registered trademarks of Absolute Software Corporation ©2024, or its subsidiaries. All Rights Reserved. Other names or logos mentioned herein may be the trademarks of Absolute or their respective owners. The absence of the symbols ™ and ® in proximity to each trademark, or at all, herein is not a disclaimer of ownership of the related trademark. Absolute Security is a Crosspoint Capital portfolio company.

For more information, please contact:

Media Relations
Joe Franscella
[email protected]

Financial Services