Events & Webinars
Register for upcoming events and watch previous events on-demand.
Upcoming Events


Upcoming and Recent Webinars


Endpoint Resilience As A Proactive Security Strategy
Resilience. It’s a word we’ve heard a lot this past year. From supply chains to telework infrastructure, and even our own mental health, we’ve all shown resilience in the face of the pandemic. Have our devices done the same?
The realities of digital transformation, combined with widespread work-from-home solutions, have ushered in a new wave of threats to endpoint devices. The result is a security landscape more complex than ever.
We commissioned Forrester Consulting to conduct a study surveying IT and security professionals about the challenges they face today and uncovered an essential capability to overcome them: endpoint resilience.
Join Absolute and out guest speaker, Forrester’s Senior Analyst for Security and Risk, Chris Sherman, for a live discussion on the key data points and findings—and three recommendations to help your organization take a more proactive approach to endpoint security.


Five Easy Ways to Transform Your Absolute Account
Diet and exercise. They’re essential to our health — no shortcuts. But we all know that’s easier said than done.
Fortunately, maintaining a healthy device population isn’t nearly as demanding.
By protecting your data and devices with Absolute, you’re already in great shape. And the good news is, Absolute offers shortcuts galore to transform your endpoint security — quickly and painlessly.


Effective Asset Lifecycle Management
Maximize Absolute for IT asset management across your organization
Learn Absolute’s best practices for deploying, managing, monitoring, and decommissioning your IT assets.
The investment your organization expends in acquiring and securing IT assets is substantial; therefore, the management and governance of them is critical. As an Absolute customer, there’s a lot you can do to keep your devices safe, visible, and under your control at all times.
In this webinar, we will explore how to optimize Absolute to effectively manage your assets throughout their lifespan and extend their value. From initial deployment to the eventual end-of-life process, find out how to use Absolute to its fullest in order to maintain the integrity of your devices.


Cyber Resilience: Moving Beyond the Buzzword
Cyber Resilience is a paradigm larger and more critical than traditional cybersecurity. Organizations with effective Cyber Resilience capabilities have digital operations that can withstand and quickly recover to normal business operations following technical malfunctions, deliberate tampering, and cyberattacks.
But what does it actually mean to be Cyber Resilient? And how do we accomplish it? Security practitioners continue to define the phrase and offer recommendations for implementation.


Empowering Organizations to Troubleshoot in a Remote Work Culture
In today’s work-from-anywhere environment, device and security risks can appear from a variety of different sources. IT and security teams are expected to swiftly troubleshoot potential risks before they progress into more serious security incidents. Learn how you can utilize Absolute’s remediation capabilities to identify and respond to device risks and vulnerabilities to maintain your organization’s security posture, lower helpdesk costs, and assure employee productivity.


Endpoint & Network Visibility: Ensure visibility & control, even outside of the corporate network
Gain detailed insights into the performance of every network your employees connect to, from home and private networks to public Wi-Fi and cellular networks. Understand more about disconnections, weak coverage areas, download speeds, network throughput, and more. Profile the security of networks that workers connect to, identifying and preventing potential data leaks and man-in-the-middle attacks.


Self Healing: Ensure the efficacy of your most valued security applications
How do you ensure the critical applications you’ve invested in are always functioning across your endpoint? Learn how Application Resilience helps to maintain the efficacy of security tools such as anti-malware, encryption, unified endpoint management tools, and endpoint detection and response solutions through automated self-healing and remediation.


ZTNA: How to Finetune Your Policies
Deploying policies for users is the first step towards "least privilege" access. But, what if you could determine if the policies you've deployed fully balance security and access? Learn how you can use information gathered by Insights for Network to fine-tune policies for your users -- ensuring that they have access to the right applications, resources, and information anytime, anywhere.


Ransomware Readiness: Is your organization prepared for a possible attack?
Learn how you can boost your ransomware preparedness to guard against the most significant threat to businesses today by establishing a cyber hygiene baseline across your endpoints and ensuring the tools needed for expedited remediation and recovery are always functioning.


Preparing your Device Fleet for the Economic Downturn
Current economic conditions require many organizations to revisit all of their IT investments to determine return of investment and overall utilization. The goal is to identify technologies that can be either consolidated or completely cut. In this context, it is essential to understand technology utilization while at the same time streamline and automate standard processes that for instance deal with the offboarding of employees. Learn how Absolute Secure Endpoint can assist your IT team in these cases.


Zero Trust Architecture: Implement & maintain a strong security posture
Learn why adopting a Zero Trust strategy in conjunction with network access is vitally important in today’s work-from-anywhere environment. Remote users may attempt to access applications and corporate resources via unsecure networks and so establishing a software-defined perimeter via ZTNA policies is critical to maintain your security posture.


Network Performance & Diagnostics
Workers, devices, and applications interact constantly each day to get the job done. But sometimes, network connection problems, device hardware, or some unknown issue conspire to reduce productivity. Learn how Absolute Secure Access' performance and diagnostics can help IT respond quickly to resolve the issue and get workers productive again.


Leveraging AI to Block Malicious Content
Threat actors are using AI to probe for weaknesses in both software and people – and are using the web as a delivery mechanism. Absolute’s Secure Access offers two unique ways of helping IT fight this battle by leveraging AI itself. Learn how Secure Access’ Reputation Service and Insights for Network can be used together to combat an increasingly complex cybersecurity landscape.


Critical Security & Productivity Applications
With the rise in hybrid and remote work policies, employees expect uninterrupted access to business, productivity and communication tools regardless of where they are working from. Furthermore, it is vital for IT and security teams to ensure critical security applications such as Endpoint Protection, Endpoint Detection and Response, and Zero-Trust Network Access are healthy and functioning to maintain the security posture of their remote device environment. Learn how Application Health monitoring and Application Resilience helps in assessing and remediating the health of your most important business and security applications.


Leveraging Device Visibility to Boost Your IT & Security Processes
A vital part of securing your digital environment is ensuring you have granular visibility across all your endpoints. Learn how you can utilize Absolute's source of truth visibility into devices, stored data, installed applications, usage and performance metrics and more to boost your organization's IT and security processes.