Secure Endpoint

Absolute Resilience for Automation

Respond quicker to security vulnerabilities through automated workflows

Absolute Security Launches New Integrated Resilience Capabilities for Patching, Vulnerability Management and Ransomware Remediation


Automate the remediation of security exposures

Security vulnerabilities and misconfigurations can crop up from a variety of sources such as the operating system, deployed software, network or firewall settings and weak passwords. Leverage automation to seamlessly identify and respond to exposures to ensure your attack surface is minimized.

Highlights

Absolute Resilience for Automation™, the highest edition of the Secure Endpoint product, offers automated remediation of operating system, software and security vulnerabilities to eliminate risk and reduce an organization’s attack surface. It combines all the capabilities of Absolute Visibility™, Absolute Control™, Absolute Resilience™ and Absolute Resilience for Security™ with two additional critical features, Remediate and Automate.

Monitor Icon

Detect Varied Security Exposures

Scan for operating system, software and security vulnerabilities, misconfigurations, blind spots to detect a potential breach before it occurs.

Deploy Remediation Scripts

Access an extensive library of prebuilt remediation workflows for thousands of existing vulnerabilities to secure devices at the push of a button.

Build Automated Workflows

Visually define custom remediation workflows with multi-step actions using the intuitive automation workflow builder.

Respond to Zero-Day Vulnerabilities

Swiftly react to disclosed vulnerabilities once patches are available to limit exposure.

Policy Automation

Detect behavioral and state changes on endpoints in real-time and execute self-healing workflows to harden endpoints and improve compliance.

Prioritize Patches by Risk

Intelligently target patches with the highest risk to keep your environment safe and compliant.

Minimize operational downtime

Respond quickly to cyber threats and IT issues with the rehydrate capability to minimize downtime.

Rehydrate Compromised Endpoints

Remotely recover devices back to a fully trusted and compliant state to get your business back up and running faster and prevent lateral attack movement.

Learn more about Absolute Rehydrate!

Absolute Rehydrate enables organizations to remotely and seamlessly respond to an IT or security incident to ensure downtime to their business operations is minimized. This empowers practitioners to remotely recover compromised devices back to a fully trusted and compliant state after an event occurs.

Learn more

Identify and respond to security vulnerabilities

Minimize your attack surface that can be exploited

  • Combine patch and vulnerability management using live, real-time data to eliminate both operating system vulnerabilities and security weaknesses.
  • Access thousands of workflows for existing vulnerabilities directly through the Absolute Console as well as updated content as new vulnerabilities are discovered.
  • Respond to a variety of other security weaknesses like user account misconfigurations, insecure passwords, out of date anti-virus or definitions, disabled firewalls and open ports.

Build automated remediation workflows

Leverage the intuitive workflow builder

  • Visually define custom workflows using the automated workflow builder without requiring any coding. Deploy complex remediations that would otherwise require advanced scripting.
  • Build multi-step actions using the builder to reestablish control and eliminate risk at the endpoint.
  • Leverage the unique Persistence technology embedded in the firmware of PCs as well as a unique endpoint management architecture providing real time visibility to reliably scan for and respond to threats.

Recover endpoints quickly

Accelerate endpoint recovery after an IT issue or cyberattack to a fully trusted and compliant state.

  • Firmware-based endpoint recovery playbooks bypass the operating system if tampered with, including options like rehydrating from a trusted OS image, modifying files/registry keys, and executing scripts.
  • Passcode-protected “break-glass” mechanism runs at bootup to download and execute recovery playbooks, ensuring secure recovery.
  • Management and status tracking of recovery playbooks through the Absolute Console, with role-based access controls for certified users.

What our customers love about Absolute Resilience

"With Absolute, we can quickly assess and protect our endpoints… allowing us to keep safe the PHI that we are responsible for protecting."

Chris Schmidt

Manager of Information Security at Greenville Health System

 

Absolute Resilience

Delivers application self-healing and confident risk response.


Request a Demo

All Control features, plus 

  • Monitor basic application health parameters to determine any failures for swift self-mitigation
  • Make critical applications self-healing
  • Remotely run query or remediation scripts
  • Investigate and recover stolen devices
  • Rehydrate compromised endpoints after an IT or security event to limit unexpected downtime

Learn more

 

Absolute Resilience for Security

Provides seamless and proactive patch management


Request a Demo

All Resilience features, plus

  • Scan for known operating system and software vulnerabilities
  • Flexible scheduling of patch deployments to ensure end user productivity is protected
  • Patch compliance reporting against a variety of security frameworks and data regulations

Learn more

 

Absolute Resilience for Automation

Remediation of security vulnerabilities through automated workflows


Request a Demo

All Resilience for Security features, plus 

  • Assessment of OS, software and security vulnerabilities across your environment
  • Automated remediation through a library of pre-built workflows for thousands of existing vulnerabilities
  • Build automated custom workflows using the visual and intuitive builder

Learn more

Absolute Resilience Add-Ons


Absolute Ransomware Response for Resilience

Augment your Absolute Resilience capabilities to gain an advantage for ransomware preparedness and recovery across your device fleet.


Learn more

Related Product Packages


Absolute Resilience for Chromebooks

Specifically tailored capabilities for Chromebook users.

Learn more

Absolute Resilience for Student Devices

Specifically tailored capabilities for Windows student devices.

Learn more

Absolute Resilience for Education

Specifically tailored capabilities for Education customers.

Learn more

Secure Endpoint FAQ

Take action and learn more

Like what you're hearing?

We’d love to show you how Absolute can secure and empower your organization.

Financial Services