Compare Absolute Product Packages
Choose the Absolute product package that provides the solutions your organization needs.
Track hardware
Report and alert on hundreds of hardware attributes
Monitor device leasing reports
Track new device activations and connection history
Leverage pre-built and custom reports
Flag missing devices and be alerted when they connect to the internet
Track Installed Software
Report on installed software by device or population
Capture Device Insights
Collect Absolute defined data points from the DataExplorer Library1
Configure the collection of custom data points tailored to specific needs using the DataExplorer Builder
Assess Device Security Posture
Encryption status reporting
Anti-malware status reporting
Measure Device Usage
Assess device usage by analyzing login/unlock and device interaction events
Report on average daily usage by device
Report on visited websites and understand the ROI from Web Apps in your environment3
Identify Sensitive Files On Devices
Discover PII, PHI, PFI, SSN, GDPR data and Intellectual Property on/off network
Perform data risk assessment with estimated cost exposure
Identify devices with sensitive files syncing with cloud storage (Dropbox, iCloud, Box, OneDrive)
Monitor Device Location
Track device location with 365 days of history
Define geofences to detect unauthorized device movement
Remotely Freeze Devices
Freeze a device with custom message – scheduled or on demand
Set an offline timer to automatically freeze devices
Freeze a device via the firmware for an extra layer of protection4
Remotely Delete Data From Devices
Selectively delete files
Perform an end-of-life device wipe with compliance certificate
Enable Firmware Protection
Manage supervisor password at scale5
Secure, On-Device End User Communications
Inform users by displaying important messaging on their devices’ screen or to solicit feedback
Query and Remediate Devices Immediately at Scale
Run 130+ prebuilt workflows from Reach Library
Run Custom Powershell or BASH scripts on devices
Application Health Reporting
Monitor basic application health parameters across 2,000 Windows and Mac business, productivity, and security apps to detect any failures and self-mitigate.7
Advanced monitoring of the application health of a select group of mission-critical security apps with automated mitigation capabilities.8
Make Critical apps covered in the application resilience catalog self-healing8
Check out the Absolute Application Resilience catalog to find out the range of mission-critical applications covered9
Other applications10
Investigate and Recover Stolen Devices
Recover stolen devices
Service Guarantee for devices not recovered11 (Education only)
Rehydrate
Remotely recover affected devices in response to unexpected disruptions due to IT or security incidents
Utilize Absolute defined recovery playbooks that run via the firmware to bring devices back to fully trusted and compliant state
Patch Management
Unified assessment of OS patch health across devices and automated deployment
Patching across a veriety of third-party applications
Patch compliance reporting across security frameworks and data regulations
Security Vulnerability Assessment and Remediation
Scan for security vulnerabilities and misconfigurations and detect a protential breach before it occurs
Access an extensive library of prebuilt remediation workflows to secure devices at the push of a button
Automated Workflows
Build and deploy custom workflows using the visual and intuitive automation workflow builder with no coding required
Build multi-step actions to reestablish control and eliminate risk at the endpoint
Automate policies to detect behavioral and state changes on endpoints in real-time and execute self-healing workflows to harden endpoints and improve compliance
Absolute Platform Features
Absolute Persistence
Rules & Policy Engine
Alerts
Dashboards
API Library13
Cloud-based console
Predefined and customized alerts
Role-based access control
Single sign-on
2-factor authentication
Absolute Connector for ServiceNow®
Universal SIEM connector
Absolute Connector for Forescout eyeSight
Automated Actions
Accelerated Device Actions14
Accelerated Device Actions14
1 Contact Absolute Sales to inquire about defining new custom device data points to be made available through the DataExplorer Library. DataExplorer is not supported on Windows 11 SE.
2 Apple M1 based Mac devices require Absolute agent version 7.15 or above to be installed to capture updated Encryption status details.
3 Only available for Chrome browser, on Windows and Chromebook devices.
4 Firmware Freeze is only available on eligible Windows devices.
5 Only available for eligible Lenovo Devices.
6 All scripts in the Absolute Reach library are supported on Windows ❨except Windows 11 SE❩, while certain scripts are supported on MacOS.
7 Absolute Application Health is available with eligible Absolute Resilience licenses. These do not include Absolute Resilience for Education, Absolute Resilience for Student Devices and Absolute Resilience for Chromebook.
8 Check out the Absolute Application Resilience catalog to find out the range of mission-critical applications covered.
9 Self-healing of critical applications is available through Absolute Resilience. It is not supported Windows 11 SE. Contact Absolute Sales for more information.
10 Absolute is continuously adding to its Application Resilience catalog of supported apps. If you have a particular application that you would like to make resilient to external factors, contact Absolute Sales to make a request.
11 North American, UK and Australian Education Customers only. Terms and Conditions apply. See FAQ for more details.
12 API support for a particular product feature or function is aligned with the availability of that feature for a given base or add-on product. Devices that are not licensed for a given feature will not have access to APIs for it.
Download the Full Product Comparison Chart | View features for Chromebooks
Compare Absolute Secure Access Products
Comprehensive, resilient SSE solutions with Safe Connect and Compliance for optimized, secure access to private apps, cloud, and web
Always-on application connections and advanced, undeletable client with embedded firmware technology
Endpoint Compliance
Report and alert on hundreds of hardware attributes
Flag missing devices and be alerted when they connect to the internet
Assess security posture, including Anti-Malware and Encryption status, and monitor the health of other mission-critical applications
Freeze a device on demand with a custom message
Strengthen your Absolute Secure Access deployment through self-healing
Zero Trust Network Access (ZTNA)
Secure optimized tunnel
Advanced Client with always-on secure connectivity using tunnel and application session persistence and resilience
Universal ZTNA with granular policy enforcement at the endpoint, giving admins visibility and enforcement inside and outside the tunnel
Network Access Control to ensure comply-to-connect and enable warning, quarantine, or remediation on non-compliance
Distributed Firewall on each endpoint for a strengthened security posture against intrusions
Application persistence and resilience for always-on and always-protected business operations
Digital Experience Monitoring (DEM)
Dashboards for monitoring and reporting with data retention of 90 days
User and Entity Behavior Analytics (UEBA)
Proactive AI- and ML-based UEBA on user, device, network, and application behavior to identify suspicious activity before it becomes a problem
Internet Access (Secure Web Gateway)
Cell
Cell
Secure Web Gateway (SWG) for protection against zero-day attacks, malware, and malicious code for hybrid, mobile, and field workers
Web Reputation and URL categorization to minimize risky website activity and protect organizations against malware
SSL/TLS inspection for increased scrutiny of low-risk traffic that may be hiding malware
Integrated DLP to prevent inadvertent or malicious insider uploads of sensitive data or information
Advanced Threat Protection
Inline AV scan & malware detection for known malware, trojans, and spyware
Remote Browser Isolation (RBI) to safely render content in a cloud container away from the endpoint
Content Disarm and Reconstruction (CDR) to scan and sanitize documents from hidden malware
Cloud Access Security Broker (CASB)
Cell
Cell
CASB inline for protection of SaaS applications
CASB Shadow IT to guard against unsanctioned applications