Join Absolute Security at RSAC 2025: Tackle your toughest security challenges with us and discover Extreme Resilience!
Find us there

Compare Absolute Product Packages

Choose the Absolute product package that provides the solutions your organization needs.

Absolute Visibility
Absolute Control
Absolute Resilience
Absolute Resilience for Security
Absolute Resilience for Automation
Most powerful
Feature Availability
Serves as your source of truth for device and application health.
Provides you a lifeline to protect at-risk devices and data.
Delivers application self-healing and confident risk response.
Provides seamless and proactive patch management.
Offers remediation of security vulnerabilities through automated workflows.
By Operating System

Track hardware

Report and alert on hundreds of hardware attributes

Monitor device leasing reports

Track new device activations and connection history

Leverage pre-built and custom reports

Flag missing devices and be alerted when they connect to the internet

Track Installed Software

Report on installed software by device or population

Capture Device Insights

Collect Absolute defined data points from the DataExplorer Library1

Configure the collection of custom data points tailored to specific needs using the DataExplorer Builder

Assess Device Security Posture

Encryption status reporting

Anti-malware status reporting

Measure Device Usage

Assess device usage by analyzing login/unlock and device interaction events

Report on average daily usage by device

Report on visited websites and understand the ROI from Web Apps in your environment3

Identify Sensitive Files On Devices

Discover PII, PHI, PFI, SSN, GDPR data and Intellectual Property on/off network

Perform data risk assessment with estimated cost exposure

Identify devices with sensitive files syncing with cloud storage (Dropbox, iCloud, Box, OneDrive)

Monitor Device Location

Track device location with 365 days of history

Define geofences to detect unauthorized device movement

Remotely Freeze Devices

Freeze a device with custom message – scheduled or on demand

Set an offline timer to automatically freeze devices

Freeze a device via the firmware for an extra layer of protection4

Remotely Delete Data From Devices

Selectively delete files

Perform an end-of-life device wipe with compliance certificate

Enable Firmware Protection

Manage supervisor password at scale5

Secure, On-Device End User Communications

Inform users by displaying important messaging on their devices’ screen or to solicit feedback

Query and Remediate Devices Immediately at Scale

Run 130+ prebuilt workflows from Reach Library

Run Custom Powershell or BASH scripts on devices

Application Health Reporting

Monitor basic application health parameters across 2,000 Windows and Mac business, productivity, and security apps to detect any failures and self-mitigate.7

Advanced monitoring of the application health of a select group of mission-critical security apps with automated mitigation capabilities.8

Make Critical apps covered in the application resilience catalog self-healing8

Check out the Absolute Application Resilience catalog to find out the range of mission-critical applications covered9

Other applications10

Investigate and Recover Stolen Devices

Recover stolen devices

Service Guarantee for devices not recovered11 (Education only)

Rehydrate

Remotely recover affected devices in response to unexpected disruptions due to IT or security incidents

Utilize Absolute defined recovery playbooks that run via the firmware to bring devices back to fully trusted and compliant state

Patch Management

Unified assessment of OS patch health across devices and automated deployment

Patching across a veriety of third-party applications

Patch compliance reporting across security frameworks and data regulations

Security Vulnerability Assessment and Remediation

Scan for security vulnerabilities and misconfigurations and detect a protential breach before it occurs

Access an extensive library of prebuilt remediation workflows to secure devices at the push of a button

Automated Workflows

Build and deploy custom workflows using the visual and intuitive automation workflow builder with no coding required

Build multi-step actions to reestablish control and eliminate risk at the endpoint

Automate policies to detect behavioral and state changes on endpoints in real-time and execute self-healing workflows to harden endpoints and improve compliance

Absolute Platform Features

Absolute Persistence

Rules & Policy Engine

Alerts

Dashboards

API Library13

Cloud-based console

Predefined and customized alerts

Role-based access control

Single sign-on

2-factor authentication

Absolute Connector for ServiceNow®

Universal SIEM connector

Absolute Connector for Forescout eyeSight

Automated Actions

Accelerated Device Actions14

Accelerated Device Actions14

Discover your endpoint environment
Retain command of your devices
Recover compromised devices and self-heal apps
Scan for and deploy patches
Identify and respond to vulnerabilities
Included
Add-on feature
Report only
Windows
Mac
Chrome
iOS
Android

1 Contact Absolute Sales to inquire about defining new custom device data points to be made available through the DataExplorer Library. DataExplorer is not supported on Windows 11 SE.

2 Apple M1 based Mac devices require Absolute agent version 7.15 or above to be installed to capture updated Encryption status details.

3 Only available for Chrome browser, on Windows and Chromebook devices.

4 Firmware Freeze is only available on eligible Windows devices.

5 Only available for eligible Lenovo Devices.

6 All scripts in the Absolute Reach library are supported on Windows ❨except Windows 11 SE❩, while certain scripts are supported on MacOS.

7 Absolute Application Health is available with eligible Absolute Resilience licenses. These do not include Absolute Resilience for Education, Absolute Resilience for Student Devices and Absolute Resilience for Chromebook.

8 Check out the Absolute Application Resilience catalog to find out the range of mission-critical applications covered.

9 Self-healing of critical applications is available through Absolute Resilience. It is not supported Windows 11 SE. Contact Absolute Sales for more information.

10 Absolute is continuously adding to its Application Resilience catalog of supported apps. If you have a particular application that you would like to make resilient to external factors, contact Absolute Sales to make a request.

11 North American, UK and Australian Education Customers only. Terms and Conditions apply. See FAQ for more details.

12 API support for a particular product feature or function is aligned with the availability of that feature for a given base or add-on product. Devices that are not licensed for a given feature will not have access to APIs for it.

Security Focused Product

Ransomware Response

Absolute Ransomware Response enables organizations to assess their endpoint ransomware preparedness, monitor their endpoint cyber hygiene, and expedite ransomware recovery.

Compare Absolute Secure Access Products

Comprehensive, resilient SSE solutions with Safe Connect and Compliance for optimized, secure access to private apps, cloud, and web

Core
Edge
Absolute Resilience
Absolute Resilience for Security
Enterprise
Provides you a lifeline to protect at-risk devices and data.
Provides you a lifeline to protect at-risk devices and data.
Resilience

Always-on application connections and advanced, undeletable client with embedded firmware technology

Endpoint Compliance

Report and alert on hundreds of hardware attributes

Flag missing devices and be alerted when they connect to the internet

Assess security posture, including Anti-Malware and Encryption status, and monitor the health of other mission-critical applications

Freeze a device on demand with a custom message

Strengthen your Absolute Secure Access deployment through self-healing

Zero Trust Network Access (ZTNA)

Secure optimized tunnel

Advanced Client with always-on secure connectivity using tunnel and application session persistence and resilience

Universal ZTNA with granular policy enforcement at the endpoint, giving admins visibility and enforcement inside and outside the tunnel

Network Access Control to ensure comply-to-connect and enable warning, quarantine, or remediation on non-compliance

Distributed Firewall on each endpoint for a strengthened security posture against intrusions

Application persistence and resilience for always-on and always-protected business operations

Digital Experience Monitoring (DEM)

Dashboards for monitoring and reporting with data retention of 90 days

User and Entity Behavior Analytics (UEBA)

Proactive AI- and ML-based UEBA on user, device, network, and application behavior to identify suspicious activity before it becomes a problem

Internet Access (Secure Web Gateway)

Cell

Cell

Secure Web Gateway (SWG) for protection against zero-day attacks, malware, and malicious code for hybrid, mobile, and field workers

Web Reputation and URL categorization to minimize risky website activity and protect organizations against malware

SSL/TLS inspection for increased scrutiny of low-risk traffic that may be hiding malware

Integrated DLP to prevent inadvertent or malicious insider uploads of sensitive data or information

Advanced Threat Protection

Inline AV scan & malware detection for known malware, trojans, and spyware

Remote Browser Isolation (RBI) to safely render content in a cloud container away from the endpoint

Content Disarm and Reconstruction (CDR) to scan and sanitize documents from hidden malware

Cloud Access Security Broker (CASB)

Cell

Cell

CASB inline for protection of SaaS applications

CASB Shadow IT to guard against unsanctioned applications

Included
Add-on feature

Buy through our partners

Our system manufacturer partners, certified network of distributors, telecom carriers, and value-added resellers are here to help you to purchase and successfully deploy Absolute’s self-healing, intelligent security solutions.