Absolute Resilience for Security
Automated patch management and endpoint recovery

Streamlined Patch Management
Ensure routine patching happens smoothly and efficiently with minimal impact on users. Easily identify out-of-date or vulnerable software and use context-based prioritization to maximize protection for sensitive data. Prevent unauthorized access with streamlined testing and roll out.

Highlights
Absolute Resilience for Security™ offers automated endpoint patching and recovery to prevent exploitation and disruption. It combines all the capabilities of Absolute Visibility™, Absolute Control™, and Absolute Resilience™ with Patch Management.

Scan for out-of-date operating system and third-party software wherever your endpoints are and avoid non-compliant devices.
Streamline patch testing and application with automation and schedule maintenance windows to reduce disruption to users.
Intelligently target patches with the highest risk to keep your environment safe and compliant.
Respond quickly to cyber threats and IT issues with the rehydrate capability to minimize downtime.
Remotely recover devices back to a fully trusted and compliant state to get your business back up and running faster and prevent lateral attack movement.
Learn more about Absolute Rehydrate!
Absolute Rehydrate enables organizations to remotely and seamlessly respond to an IT or security incident to ensure downtime to their business operations is minimized. This empowers practitioners to remotely recover compromised devices back to a fully trusted and compliant state after an event occurs.

Streamlined Patch Management
Seamless assessment of patch health for automatic detection and deployment
- Sophisticated patch scanning detects operating system and software vulnerabilities for Windows, Mac and Linux devices.
- Flexible scheduling of patch deployments to protect end user productivity.
- Automatic patch availability within 24 hours for operating system and third-party applications (e.g. Adobe, Chrome, Zoom etc.).

Recover endpoints quickly
Accelerate endpoint recovery after an IT issue or cyberattack to a fully trusted and compliant state
- Firmware-based endpoint recovery playbooks bypass the operating system if tampered with, including options like rehydrating from a trusted OS image, modifying files/registry keys, and executing scripts.
- Passcode-protected “break-glass” mechanism runs at boot up to download and execute recovery playbooks, ensuring secure recovery.
- Management and status tracking of recovery playbooks through the Absolute Console, with role-based access controls for certified users.

Simple and flexible packages
Comprehensive and compliant SSE solutions to meet your business needs:
Explore Secure Endpoint Products
Serves as your source of truth for device and application health.
Provides you a lifeline to protect at-risk devices and data.
Delivers application self-healing and confident risk response.
Provides seamless and proactive patch management.
Offers remediation of security vulnerabilities through automated workflows.
Boosts ransomware preparedness and time-to-recovery.
Explore our products
Built from ground up for mobility and the modern edge.
Delivers the best user experience for the software-defined perimeter.
Comprehensive SSE provides security controls and threat protection across web, cloud, and private apps.
Boosts diagnostics and remediation for digital experience monitoring.
Web security that protects data, prevents threats, and secures access to cloud apps.
Related Product Packages
Specifically tailored capabilities for Chromebook users.
Specifically tailored capabilities for Windows student devices.
Specifically tailored capabilities for Education customers.
Featured Resources
Secure Endpoint FAQ
Absolute Secure Endpoint is one of our company’s core product lines, which leverages the unbreakable connection provided by Absolute Persistence® to enable IT and security personnel to monitor and address computers' problems and enables the computers and their mission-critical applications to self-heal. This helps with IT management, strengthening a company’s security posture, and maintaining compliance.
The Absolute Secure Endpoint product portfolio contains a variety of product packages:
- Absolute Visibility
- Absolute Control
- Absolute Resilience
- Absolute Resilience for Security
- Absolute Resilience for Automation
- Absolute Ransomware Response
Other variants, such as Absolute Resilience for Student Devices, may be offered to meet particular use cases or geographic market needs.
Absolute Resilience is the third product edition in the Absolute Secure Endpoint product portfolio. Compared to Absolute Control, it adds further capabilities to secure endpoints from IT or security risks, respond to unexpected downtime due to security breaches and incidents, and enable Application Resilience to automatically monitor and detect unhealthy applications and automatically heal them.
Absolute Resilience for Security is the fourth product edition in the Absolute Secure Endpoint product portfolio. It combines all the capabilities of Absolute Visibility™, Absolute Control™ and Absolute Resilience™ with the Patch module, enabling IT and security teams to scan their endpoint population to assess patch health in relation to known operating system and software vulnerabilities.
Absolute Resilience for Automation is the highest product edition in the Absolute Secure Endpoint product portfolio, offering automated remediation of operating system, software and security vulnerabilities to eliminate risk and reduce an organization’s attack surface. It combines all the capabilities of Absolute Visibility™, Absolute Control™, Absolute Resilience™ and Absolute Resilience for Security™ with two critical features, Remediate and Automate.
Absolute Ransomware Response is a stand-alone offering, which provides capabilities and services to assess an organization's ransomware preparedness and cyber hygiene across endpoints; ensures mission-critical security applications such as anti-malware and device management tools remain healthy and capable of self-healing; and expedites the quarantine and recovery of endpoints if a ransomware attack occurs.
Customers can easily upgrade/downgrade their product subscriptions between Absolute Visibility, Control, Resilience, Resilience for Security and Resilience for Automation. Capabilities are additive and enabled via a software license key.
Absolute Ransomware Response is offered as a stand-alone solution primarily for security-conscious customers. Add-on options are offered for Absolute Control, Resilience, Resilience for Security and Resilience for Automation customers.
Absolute can be purchased through leading device manufacturers, resellers, and distributors. Contact us and we would be happy to help you with this process.