Absolute Resilience
Make your endpoints and mission-critical applications cyber resilient


Achieve resilient, self-healing endpoints
Absolute is the world-leader and pioneer of endpoint resilience. Empower your organization to withstand and recover from cyber security threats and attacks on endpoints and installed, mission-critical applications.
Highlights
Absolute Resilience™ combines all the capabilities of Absolute Visibility™ and Absolute Control™ with critical resilience functions to detect unhealthy applications and autonomously self-heal them through Application Resilience, respond to IT or security risks and unexpected disruptions by recovering affected devices after an IT or security incident.
Minimize Operational Downtime
Respond quickly to cyber threats and IT issues with the rehydrate capability to minimize downtime.
Rehydrate Compromised Endpoints
Remotely recover devices back to a fully trusted and compliant state to get your business back up and running faster and prevent lateral attack movement.
Monitor Application Health
Observe basic application health parameters across 2,000 Windows and Mac business, productivity, and security apps to detect any failures and analyze the root cause.
Make mission-critical applications self-healing
Leverage Application Resilience to automatically repair or reinstall mission-critical applications when they have been disabled, or are not running in a healthy state.
Remotely query and remediate devices at scale
Take remedial action across devices by leveraging a library of hundreds of customized scripts to accelerate your response and recovery efforts.
Investigate and recover stolen devices
Leverage the expert Absolute Investigation team to locate and recover stolen devices in collaboration with law enforcement.

Learn more about Absolute Rehydrate!
Absolute Rehydrate enables organizations to remotely and seamlessly respond to an IT or security incident to ensure downtime to their business operations is minimized. This empowers practitioners to remotely recover compromised devices back to a fully trusted and compliant state after an event occurs.

Remediate your devices remotely and at scale
Make your endpoints resilient to external factors
- Monitor basic application health parameters across 2,000 Windows and Mac apps to determine any failures, allowing for swift self-mitigation.
- Leverage Application Resilience to monitor mission-critical applications’ health and behavior; detect if missing, corrupted, or not running; and automatically repair or re-installs components when necessary – without requiring human intervention.
-
Query and remediate your whole device fleet to gather precise contextual insights. Address dark endpoints, ransomware attacks, and other vulnerabilities with automation and custom or pre-built Absolute Reach scripts.

Recover endpoints quickly
Accelerate endpoint recovery after an IT issue or cyberattack to a fully trusted and compliant state.
- Firmware-based endpoint recovery playbooks bypass the operating system if tampered with, including options like rehydrating from a trusted OS image, modifying files/registry keys, and executing scripts.
- Passcode-protected “break-glass” mechanism runs at bootup to download and execute recovery playbooks, ensuring secure recovery.
- Management and status tracking of recovery playbooks through the Absolute Console, with role-based access controls for certified users.

Don’t let your devices become a liability
Minimize your risk of device loss
- Let the Absolute Investigations team pair up with local law enforcement to lead the search for your lost or stolen devices.
What our customers love about Absolute Resilience
"With Absolute, we can quickly assess and protect our endpoints… allowing us to keep safe the PHI that we are responsible for protecting."
Chris Schmidt
Manager of Information Security at Greenville Health System

Absolute Resilience
Delivers application self-healing and confident risk response.
Request a Demo
All Control features, plus
- Monitor basic application health parameters to determine any failures for swift self-mitigation
- Make critical applications self-healing
- Remotely run query or remediation scripts
- Investigate and recover stolen devices
- Rehydrate compromised endpoints after an IT or security event to limit unexpected downtime
Absolute Resilience for Security
Provides seamless and proactive patch management
Request a Demo
All Resilience features, plus
- Scan for known operating system and software vulnerabilities
- Flexible scheduling of patch deployments to ensure end user productivity is protected
- Patch compliance reporting against a variety of security frameworks and data regulations
Most Powerful
Absolute Resilience for Automation
Remediation of security vulnerabilities through automated workflows
Request a Demo
All Resilience for Security features, plus
- Assessment of OS, software and security vulnerabilities across your environment
- Automated remediation through a library of pre-built workflows for thousands of existing vulnerabilities
- Build automated custom workflows using the visual and intuitive builder
Absolute Resilience Add-Ons
Absolute Ransomware Response for Resilience
Augment your Absolute Resilience capabilities to gain an advantage for ransomware preparedness and recovery across your device fleet.
Related Product Packages
Absolute Resilience for Chromebooks
Specifically tailored capabilities for Chromebook users.
Absolute Resilience for Student Devices
Specifically tailored capabilities for Windows student devices.
Absolute Resilience for Education
Specifically tailored capabilities for Education customers.
Secure Endpoint FAQ
Absolute Secure Endpoint is one of our company’s core product lines, which leverages the unbreakable connection provided by Absolute Persistence® to enable IT and security personnel to monitor and address computers' problems and enables the computers and their mission-critical applications to self-heal. This helps with IT management, strengthening a company’s security posture, and maintaining compliance.
The Absolute Secure Endpoint product portfolio contains a variety of product packages:
- Absolute Visibility
- Absolute Control
- Absolute Resilience
- Absolute Resilience for Security
- Absolute Resilience for Automation
- Absolute Ransomware Response
Other variants, such as Absolute Resilience for Student Devices, may be offered to meet particular use cases or geographic market needs.
Absolute Resilience is the third product edition in the Absolute Secure Endpoint product portfolio. Compared to Absolute Control, it adds further capabilities to secure endpoints from IT or security risks, respond to unexpected downtime due to security breaches and incidents, and enable Application Resilience to automatically monitor and detect unhealthy applications and automatically heal them.
Absolute Resilience for Security is the fourth product edition in the Absolute Secure Endpoint product portfolio. It combines all the capabilities of Absolute Visibility™, Absolute Control™ and Absolute Resilience™ with the Patch module, enabling IT and security teams to scan their endpoint population to assess patch health in relation to known operating system and software vulnerabilities.
Absolute Resilience for Automation is the highest product edition in the Absolute Secure Endpoint product portfolio, offering automated remediation of operating system, software and security vulnerabilities to eliminate risk and reduce an organization’s attack surface. It combines all the capabilities of Absolute Visibility™, Absolute Control™, Absolute Resilience™ and Absolute Resilience for Security™ with two critical features, Remediate and Automate.
Absolute Ransomware Response is a stand-alone offering, which provides capabilities and services to assess an organization's ransomware preparedness and cyber hygiene across endpoints; ensures mission-critical security applications such as anti-malware and device management tools remain healthy and capable of self-healing; and expedites the quarantine and recovery of endpoints if a ransomware attack occurs.
Customers can easily upgrade/downgrade their product subscriptions between Absolute Visibility, Control, Resilience, Resilience for Security and Resilience for Automation. Capabilities are additive and enabled via a software license key.
Absolute Ransomware Response is offered as a stand-alone solution primarily for security-conscious customers. Add-on options are offered for Absolute Control, Resilience, Resilience for Security and Resilience for Automation customers.
Absolute can be purchased through leading device manufacturers, resellers, and distributors. Contact us and we would be happy to help you with this process.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Not ready for a demo? Have some questions?