Absolute Secure Access
Delivering a Security Service Edge (SSE) optimized for hybrid and mobile work models
Reliable, resilient access for the anywhere workforce
To enable a secure and productive work-from-anywhere environment, it is vital to fortify your business from endpoint firmware to network access, so you can get to work - and keep working - no matter where risk finds you. What sets Absolute Secure Access apart is its purpose-built technology that is designed to meet the complex needs of highly mobile, distributed workforces. It delivers innovative capabilities needed to ensure employee productivity and provides an exceptional experience for both users and IT administrators. Ultimately, Absolute makes counting on a networked world possible.
Highlights
Absolute Secure Access delivers capabilities that you typically only find in separate offerings that make up the modern Secure Access Service Edge (SASE) or Security Service Edge paradigm (e.g., secure tunnel, ZTNA, SWG, CASB, DEM):
Make your remote access solution resilient to external factors, leveraging a self-healing Secure Access client for Windows
Quickly and easily expand access to networks, the Internet, cloud services, and private applications without interfering with your employees’ ability to do their jobs
Make applications invisible to unauthorized users, which reduces the attack surface
Conduct real-time risk assessments as well as threat detection and prevention
Assure a secure browsing experience for all – desk, mobile, or hybrid users
Improve helpdesk effectiveness by proactively diagnosing and correcting poorly performing networks
An optimized tunnel to stabilize and improve connectivity
Reliable and resilient remote access
- Assure reliable network application access for end users even in the most turbulent network conditions by leveraging patented tunnel and network session resilience.
- Optimize audio and video for end users, delivering positive employee experiences and increased productivity.
- Enforce security policy directly on the mobile endpoints, which prevents any chokepoints, bottlenecks, or unnecessary data backhaul.
Embrace a Zero Trust approach
Security without sacrificing productivity
- Shield SaaS, on-prem, or private cloud resources from intruders and attacks.
- Leverage dynamic, contextual access policies to any online destination, with or without use of a secure tunnel.
- Verify that third-party security products are updated and enabled before granting connections.
- Automatically block phishing and smishing attacks by preventing access to servers or Internet sites that pose a security risk.
- Allow complete remote access control, inside and outside the firewall.
Deliver a secure browsing experience for all – desk, mobile, or hybrid workers
Protect against online security threats and infections
- Defend against viruses, malware, malicious code, zero-day threats, as well as data loss or leakage.
- Safely inspect, scrub, and inoculate Web content in a cloud container before delivering it safely to the end user’s Web browser.
- Scan for the presence of malware, including worms, Trojan horses, and spyware.
- Block malware (including zero-day threats) from reaching endpoints and networks by rendering websites in isolated containers located on remote servers far from the endpoint.
- Disarm and reconstruct content from file downloads.
- Prevent inadvertent uploads of sensitive information to maintain compliance, protect intellectual property, and reduce overall risk exposure.
Govern cloud usage across devices and cloud applications
Unlock the power of the cloud
- Control access to SaaS applications based on risk, including contextual factors like time of day, user, device security posture, geolocation, network connection, etc.
- Prevent malicious and accidental data leakage across cloud-based resources.
- Stop the spread of threats such as ransomware across cloud and user endpoints.
Make counting on your networked world possible
Assure continued service delivery
- Automatically restore unhealthy network connections and applications, coupled with increased visibility into network health and security posture.
- Actively improve the end user experience – boost and streamline worker productivity and efficiency.
- Gain complete visibility to remote and mobile workers, with the deepest analytics available for enterprise mobility – even outside the corporate perimeter.
- Identify and resolve failures and outages quickly, as well as enforce service SLAs.
- Track effectiveness of ZTNA policy enforcement, allowing for immediate impact analysis and further fine-tuning of policies.
Choose according to your business needs
Absolute Secure Access packages are offered in two flavors, Absolute Core™ and Absolute Edge™.
Absolute Core
Optimized, secure tunnel
Built from the ground up for mobility and the modern edge
Request a Demo
What's Included
- Actively improve the employee experience
- Always-on connectivity, using tunnel and session resilience
- Video and audio optimizations
- Secure application access via mobile-first enterprise secure tunnel
Most Powerful
Absolute Edge
All Core capabilities, plus:
Absolute ZTNA
Best user experience for the software-defined perimeter
- Full visibility outside the corporate perimeter
- Continuous risk assessments, using multiple data points to power access policies
- Restrict access to enterprise resources, no matter where they're hosted
Absolute Insights for Network
Best diagnostics and remediation for digital experience monitoring
- Patented, proactive diagnostics on device and network
- Network performance analytics outside the corporate perimeter; from cellular to public Wi-Fi
- Real-time geolocation dashboards
- Threat categorization of domains visited by remote workers
Absolute Edge Add-On
Absolute Secure Web Gateway Service
Delivers a secure browsing experience for all - desk, mobile, or hybrid users.
Secure Access FAQ
Absolute Secure Access is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides resilient network connectivity for users to securely access critical resources in the public cloud, private data centers, and on-premises. These products allow users to transition from an optimized, secure tunnel to a resilient Zero Trust approach, without impairing productivity or admin controls.
Absolute Secure Access encompasses three products:
- Absolute Core provides security and confidentiality for data in motion by means of encryption and access controls. It also offers benefits to the end user, such as making tunnel and network sessions resilient and optimizing streaming video and audio.
- Absolute Edge provides a software-defined perimeter via Zero Trust Network Access, creating a context-based, logical access boundary around an application or set of applications – wherever they're hosted. It shields applications from the Internet, making them invisible to unauthorized users. Access policies are enforced at the endpoint, avoiding latency and any data transgression.
- Absolute Enterprise is a converged, resilient cloud-native SSE platform that includes Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Private Access (ZTNA), Data Loss Prevention (DLP) and Remote Browser Isolation (RBI) into a single platform. It also includes proactive anomaly detection (AI Threat Insights) and over 70+ dashboards of user, device, network, and application behavior (Insights for Network) as well as Endpoint Compliance that gives administrators additional visibility, control, and resilience over user devices.
- Absolute Insights for Network™ offers diagnostic and experience monitoring capabilities across endpoints and network, allowing organizations to proactively monitor, investigate, and remediate end user performance issues quickly and at scale, even on networks that are not company-owned or managed.
Absolute Secure Access packages are offered in three flavors: Absolute Core™, Absolute Edge ™, and Absolute Enterprise with the included products and capabilities as outlined below. Regional variations might be available.
- Absolute Core
- Secure, optimized tunnel
- ZTNA dynamic policy enforcement
- Network Access Control (NAC)
- Absolute Edge
- Includes Absolute Core, and adds:
- AI-powered web protection (“Shadow IT”)
- Absolute Insights for Network (70+ dashboards)
- AI Threat Insights
- Absolute Enterprise
- Includes Absolute Edge, and adds:
- Multiple AV scans
- Data Loss Prevention (DLP)
- Remote Browser Isolation (RBI)
- Content Disarm and Reconstruction (CDR)
- Endpoint Compliance
For Absolute Edge customers, Absolute offers the Absolute Secure Web Gateway Service (powered by Ericom) add-on module that tightly integrates with the extensive policy capabilities in Absolute Secure Access. It strengthens an organization’s security posture while improving end user experience.
Customers can easily upgrade their subscription between Absolute Core, Absolute Edge, and Absolute Enterprise. Capabilities are additive and enabled via a software license key.
Absolute Enterprise converges Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Private Access (ZTNA), Data Loss Prevention (DLP) and Remote Browser Isolation (RBI) into a single platform. Absolute Enterprise provides real-time data and threat protection against advanced zero-day and cloud-enabled threats and offers Endpoint Compliance that enables additional visibility, control, and resilience on devices.
Absolute Secure Access supports Apple® iPad and iPhone devices (iOS 11 and later), Apple MacOS (10.13 and later), Android devices (running on Android 5.0 or later), Android for Work, Samsung KNOX, Windows Pro Tablets, laptops, and other devices running Windows 8, 10, and 11.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Secure Endpoint
Mitigating Zero-Day Threats in a Complex Cybersecurity LandscapeLive Webinar - Sept 17, 2024 | 9AM PT
Secure Access
Leveraging AI to Protect Against Modern Cybersecurity ThreatsLive Webinar - Oct 1, 2024 | 9AM PT
Not ready for a demo? Have some questions?