Secure Endpoint
Secure Access
Compare Absolute Product Packages
Choose the Absolute product package that provides the solutions your organization needs.
Absolute Visibility | Absolute Control | Absolute Resilience | |
---|---|---|---|
Serves as your source of truth for device and application health. |
Provides you a lifeline to protect at-risk devices and data. |
Most PowerfulDelivers application self-healing and confident risk response. |
|
Track hardware | |||
Report and alert on hundreds of hardware attributes
OS Support:
|
|||
Monitor device leasing reports
OS Support:
|
|||
Track new device activations and connection history
OS Support:
|
|||
Leverage pre-built and custom reports
OS Support:
|
|||
Flag missing devices and be alerted when they connect to the internet
OS Support:
|
|||
Track Installed Software | |||
Report on installed software by device or population
OS Support:
|
|||
Capture Device Insights | |||
Collect Absolute defined data points from the DataExplorer Library1
OS Support:
|
|||
Configure the collection of custom data points tailored to specific needs using the
DataExplorer Builder
OS Support:
|
|||
Assess Device Security Posture | |||
Encryption status reporting
OS Support:
2
|
|||
Anti-malware status reporting
OS Support:
|
|||
Measure Device Usage | |||
Assess device usage by analyzing login/unlock and device interaction events
OS Support:
|
|||
Report on average daily usage by device
OS Support:
|
|||
Report on visited websites and understand the ROI from Web Apps in your environment3
OS Support:
|
|||
Identify Sensitive Files On Devices | |||
Discover PII, PHI, PFI, SSN, GDPR data and Intellectual Property on/off network
OS Support:
|
|||
Perform data risk assessment with estimated cost exposure
OS Support:
|
|||
Identify devices with sensitive files syncing with cloud storage (Dropbox, iCloud, Box,
OneDrive)
OS Support:
|
|||
Monitor Device Location | |||
Track device location with 365 days of history
OS Support:
|
|||
Define geofences to detect unauthorized device movement
OS Support:
|
|||
Remotely Freeze Devices | |||
Freeze a device with custom message – scheduled or on demand
OS Support:
|
|||
Set an offline timer to automatically freeze devices
OS Support:
|
|||
Freeze a device via the firmware for an extra layer of protection4
OS Support:
4
|
|||
Remotely Delete Data From Devices | |||
Selectively delete files
OS Support:
|
|||
Perform an end-of-life device wipe with compliance certificate
OS Support:
|
|||
Enable Firmware Protection | |||
Manage supervisor password at scale5
OS Support:
|
|||
Secure, On-Device End User Communications | |||
Inform users by displaying important messaging on their devices’ screen or to solicit feedback
OS Support:
|
|||
Query and Remediate Devices Immediately at Scale | |||
Run 130+ prebuilt workflows from Reach Library
OS Support:
|
|||
Run Custom Powershell or BASH scripts on devices
OS Support:
6
|
|||
Application Health Reporting | |||
Monitor basic application health parameters across 2,000 Windows and Mac business,
productivity, and security apps to detect any failures and self-mitigate.7
OS Support:
|
|||
Advanced monitoring of the application health of a select group of mission-critical security
apps with automated mitigation capabilities.8
OS Support:
|
|||
Self-healing of mission-critical applications covered in the Application Resilience Catalog8 | |||
Check out the Absolute Application Resilience catalog to find out the range of
mission-critical applications covered9
OS Support:
|
|||
Other applications10
OS Support:
|
|||
Investigate and Recover Stolen Devices | |||
Recover stolen devices
OS Support:
|
|||
Service Guarantee for devices not recovered11 (Education only)
OS Support:
|
|||
Absolute Platform Components | |||
Absolute Persistence
OS Support:
|
|||
Rules & Policy Engine
OS Support:
|
|||
Alerts
OS Support:
|
|||
Dashboards
OS Support:
|
|||
API Library13
OS Support:
|
|||
Cloud-based console
OS Support:
|
|||
Predefined and customized alerts
OS Support:
|
|||
Role-based access control
OS Support:
|
|||
Single sign-on
OS Support:
|
|||
2-factor authentication
OS Support:
|
|||
Absolute Connector for ServiceNow®
OS Support:
|
|||
Universal SIEM connector
OS Support:
|
|||
Absolute Connector for Forescout eyeSight
OS Support:
|
|||
Automated Actions
OS Support:
|
|||
Accelerated Device Actions14
OS Support:
|
|||
Get started with Absolute Visibility |
Need more capabilities? Control |
Need a larger feature set? Resilience |
1 Contact Absolute Sales to inquire about defining new custom device data points to be made available through the DataExplorer Library. DataExplorer is not supported on Windows 11 SE.
2 Apple M1 based Mac devices require Absolute agent version 7.15 or above to be installed to capture updated Encryption status details.
3 Only available for Chrome browser, on Windows and Chromebook devices.
4 Firmware Freeze is only available on eligible Windows devices.
5 Only available for eligible Lenovo Devices.
6 All scripts in the Absolute Reach library are supported on Windows ❨except Windows 11 SE❩, while certain scripts are supported on MacOS.
7 Absolute Application Health is available with eligible Absolute Resilience licenses. These do not include Absolute Resilience for Education, Absolute Resilience for Student Devices and Absolute Resilience for Chromebook.
8 Check out the Absolute Application Resilience catalog to find out the range of mission-critical applications covered.
9 Self-healing of critical applications is available through Absolute Resilience. It is not supported Windows 11 SE. Contact Absolute Sales for more information.
10 Absolute is continuously adding to its Application Resilience catalog of supported apps. If you have a particular application that you would like to make resilient to external factors, contact Absolute Sales to make a request.
11 North American, UK and Australian Education Customers only. Terms and Conditions apply. See FAQ for more details.
13 API support for a particular product feature or function is aligned with the availability of that feature for a given base or add-on product. Devices that are not licensed for a given feature will not have access to APIs for it.
14 Accelerated Device Actions is available with Absolute Resilience. Supported actions include Device Freeze, Device Wipe, File Delete, End User Messaging, Absolute Reach scripts and Endpoint Data Discovery. These actions are available with Absolute Visibility and Absolute Control as well, but not in an accelerated manner.
Download the Full Product Comparison Chart | View features for Chromebooks
Security Focused Product
Ransomware Response
Absolute Ransomware Response enables organizations to assess their endpoint ransomware preparedness, monitor their endpoint cyber hygiene, and expedite ransomware recovery.
Compare Absolute Secure Access Products
Comprehensive, resilient SSE solutions with Safe Connect and Compliance for optimized, secure access to private apps, cloud, and web
Core | Edge | Enterprise | |
---|---|---|---|
Resilience | |||
Always-on application connections and advanced, undeletable client with embedded firmware technology | |||
Endpoint Compliance | |||
Report and alert on hundreds of hardware attributes | |||
Flag missing devices and be alerted when they connect to the internet | |||
Assess security posture, including Anti-Malware and Encryption status, and monitor the health of other mission-critical applications | |||
Freeze a device on demand with a custom message | |||
Strengthen your Absolute Secure Access deployment through self-healing | |||
Zero Trust Network Access (ZTNA) | |||
Secure optimized tunnel | |||
Advanced Client with always-on secure connectivity using tunnel and application session persistence and resilience | |||
Universal ZTNA with granular policy enforcement at the endpoint, giving admins visibility and enforcement inside and outside the tunnel | |||
Network Access Control to ensure comply-to-connect and enable warning, quarantine, or remediation on non-compliance | |||
Distributed Firewall on each endpoint for a strengthened security posture against intrusions | |||
Application persistence and resilience for always-on and always-protected business operations | |||
Digital Experience Monitoring (DEM) | |||
Dashboards for monitoring and reporting with data retention of 90 days | |||
User and Entity Behavior Analytics (UEBA) | |||
Proactive AI- and ML-based UEBA on user, device, network, and application behavior to identify suspicious activity before it becomes a problem | |||
Internet Access (Secure Web Gateway) | |||
Secure Web Gateway (SWG) for protection against zero-day attacks, malware, and malicious code for hybrid, mobile, and field workers | |||
Web Reputation and URL categorization to minimize risky website activity and protect organizations against malware | |||
SSL/TLS inspection for increased scrutiny of low-risk traffic that may be hiding malware | |||
Integrated DLP to prevent inadvertent or malicious insider uploads of sensitive data or information | |||
Advanced Threat Protection | |||
Inline AV scan & malware detection for known malware, trojans, and spyware | |||
Remote Browser Isolation (RBI) to safely render content in a cloud container away from the endpoint | |||
Content Disarm and Reconstruction (CDR) to scan and sanitize documents from hidden malware | |||
Cloud Access Security Broker (CASB) | |||
CASB inline for protection of SaaS applications | |||
CASB Shadow IT to guard against unsanctioned applications |
Buy through our partners
Our system manufacturer partners, certified network of distributors, telecom carriers, and value-added resellers are here to help you to purchase and successfully deploy Absolute’s self-healing, intelligent security solutions.
Find a Channel PartnerTake action and learn more
How to buy
Choose the Absolute product package that provides the benefits your organization needs.
Compare products
Get inspired
Explore our use cases to learn how you can maximize the return on your tech investment with Absolute.
View all use cases
Take the tour
Sign up for a demo and learn how Absolute can empower your organization.
Request a demo
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Secure Endpoint
Mitigating Zero-Day Threats in a Complex Cybersecurity LandscapeLive Webinar - Sept 17, 2024 | 9AM PT
Secure Access
Leveraging AI to Protect Against Modern Cybersecurity ThreatsLive Webinar - Oct 1, 2024 | 9AM PT