Absolute Persistence

Absolute Platformの中核コンポーネント-6億台以上のエンドポイントのファームウェアに組み込まれた優位性を活用

独自の特許技術

Absolute Persistence®技術は、30社近くの国際的システムメーカーとの提携により、すでに6億台を超えるデバイスに組み込まれています。アクティブ化されると、非常に強固なレジリエンスを発揮します。デバイスの再イメージング、ハードディスクの交換、ファームウェアの更新を行っても無効化できない唯一のセキュリティソリューションです。

他の技術には真似できません。

Unique, patented technology image

ハイライト

ここにタイトルを追加
これまでにない可視性

クラウドベースのダッシュボードが全デバイスの情報を常に表示し、リスクがあればアラートで通知。デバイスのライフサイクル管理がスムーズに。機密データの所在をもれなく把握し、リスクの高いデバイスを特定。エンドユーザー側に影響が出る前に問題に対処し、ヘルプデスクの効率を改善。

ここにタイトルを追加
これまでにないコントロール性

エンドポイントとの常時オンの接続性により、仮にデバイスが侵害されても、エンドポイントのリスク対応が可能。セキュリティ標準の適用により、コンプライアンス態勢を強化。

ここにタイトルを追加
お使いのエンドポイントとの互換性

Absolute Persistenceは世界の大手システムメーカーのデバイスに出荷時からすでに組み込み済み。具体的な対応デバイスモデルについては、こちらからご確認いただけます。

互換性を確認する

お客様が語るAbsoluteのメリット

「Persistence技術には驚きました。ITチームのメンバーがハードディスクを取り外して別のマシンに入れたところ、新しいマシンとハードディスクを新しくした古いマシンでAbsoluteクライアントが復活したのです。まさに“壊れない”技術です。」

David Reynolds氏-IT部門システムマネージャー - Rhode Island Blood Center
Read the Full Story

Frequently Asked Questions

Absolute Persistence® is unique, patented technology embedded in the firmware of 600+ million devices that provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint. The Persistence technology is installed in the firmware of most endpoint devices at the factory. Each device leaves the factory with the Persistence technology in place, waiting to be activated. Activation occurs when a customer purchases an Absolute product that supports Persistence and installs the necessary software agent.

Persistence technology is factory-embedded into the core of most endpoint devices. Once activated, it gives you unrivalled visibility and control to confidently manage your endpoints, protect at-risk data, as well as investigate and remediate potential threats. Persistence is the only firmware-embedded solution that will survive attempts to disable it, even if the device is reimaged, the hard drive is replaced, or the firmware is updated.

Through our partnership with system manufacturers, the Persistence technology is embedded in the firmware of endpoint devices at the factory. Persistence leverages Absolute’s secure channel from the cloud-based console down to the firmware. In doing so, it maintains an always-on digital tether between device and Absolute Console, ensuring two-way communication so you can reliably query information and run actions remotely.

Persistence technology remains dormant in the firmware until the Absolute Agent is installed. Once the Absolute Agent is installed, it initiates a call to the Absolute Platform and Persistence is then activated. This means that the status of the software agent is monitored and if it is missing, a reinstallation will automatically occur.

All Absolute products support Persistence technology. The software agent is installed on computers in the operating system by running an installer or when the device is imaged. The software agent sends information from each device to the Absolute Platform for IT administrators and security professionals to assess risks and to take appropriate action.

The Absolute Agent makes regularly scheduled calls over the Internet to the Absolute Platform, where customers access their account via the cloud-based Absolute Console. Telemetry collected includes device, data, application, and user information. Customers can define conditions and receive alerts if the conditions occur, allowing them to respond immediately to any potential security incident. The software agent also supports remote actions such as the running of scripts through Absolute Reach™ and self-healing of critical security applications through Application Resilience™.

No. If the Persistence technology has been enabled, the self-healing capability will repair the Absolute Agent, or any other applications supported by Application Resilience™. The computer will still be protected. The enable/disable state of the Persistence technology is stored in a part of the BIOS that cannot be flashed to remove it.

The communication between the software agent and the Absolute Platform is encrypted. Optionally, you can also enable FIPS-140 certified communication. The Federal Information Processing Standard (FIPS) Publication 140-2 is a US government security standard that specifies the security requirements for cryptographic modules protecting sensitive information. The National Institutes of Standards and Technology (NIST) publishes the list of vendors with validated FIPS 140-1 and 140-2 cryptographic modules. The Absolute Encryption Engine is validated FIPS 140-2.

デモおよびお問い合わせはこちら

デモのご依頼、無償評価版、またはお問合せフォーム
Thank You
We will be in touch shortly.