Absolute Secure Endpoint
Reliable, resilient endpoints for the anywhere workforce
Setting the cyber resiliency bar for your device fleet
Ensuring that your employees’ endpoints are cyber-resilient is paramount to productivity, business continuity, as well as your organization’s security and compliance posture. Absolute is known as the pioneer of endpoint resilience. Unique, patented Persistence® technology embedded in the firmware of 600+ million devices provides a secure, always-on connection between the Absolute cyber resilience platform and your endpoints. This allows IT and security personnel to monitor and address computers’ problems and enables the devices and their mission-critical applications to self-heal.
Highlights
Absolute Secure Endpoint™ compliments your existing endpoint security and endpoint management tools to
Optimize hardware inventory management for audit accuracy and improved device allocation
Streamline software inventory and control to assure productivity and eradicate shadow IT
Understand device and Web application usage for improved ROI
Enable remote device lifecycle management to increase IT efficiency
Improve helpdesk effectiveness by anticipating device issues and improving time-to-resolution
Assess security posture for governance purposes and minimize risk exposure
Enforce security standards to comply with industry standards, regulatory mandates, and internal policies
Respond to endpoint risks at scale and efficiently
Recover from incidents with confidence
Give your IT team constant visibility into endpoints
Serves as source of truth for device and application health
- Streamline hardware audits and software audits, avoid multi-platform fragmentation, optimize end user productivity, and optimize lease/licensing management.
- Identify and eliminate hardware or software waste, analyze usage patterns, and prove ROI.
- Track and locate all of your enrolled devices, on and off your corporate network.
- Report on the health status of mission-critical applications.
- Report on encryption and anti-virus/malware status across your device population.
- Discover sensitive data (e.g., PII, PHI, company IP) across your device fleet and identify devices that are syncing sensitive files with cloud storage services.
Take action to safeguard your devices, apps, and data
Provides a lifeline to protect at-risk devices and data
- Detect unauthorized device movement and be alerted when a device crosses an established geofence.
- Freeze devices when threats have been detected and notify users with a custom message - automated or on demand.
- Selectively delete files on any device from anywhere and remotely perform an end-of-life device wipe in accordance with NIST 800-88 with compliance certificate.
Achieve resilient, self-healing endpoints
Assure a confident risk response
- Leverage Application Resilience to automatically repair or reinstall mission-critical applications when they have been disabled, or are not running in a healthy state.
- Take remedial action across devices by leveraging a library of hundreds of customized scripts to accelerate your response and recovery efforts.
- Leverage the expert Absolute Investigation team to locate and recover stolen devices in collaboration with law enforcement.
Boost ransomware preparedness and time-to-recovery
- Assess your strategic ransomware readiness.
- Establish a cyber hygiene baseline across endpoints.
- Expedite recovery tasks by leveraging a set of unique capabilities (e.g., secure, on-device communications; device freeze; Reach script library).
- Receive remote assistance in your endpoint recovery efforts following an established playbook that applies field-proven best practices.
Choose according to your business needs
Within the Absolute Secure Endpoint product portfolio, we offer a variety of products.
Absolute Visibility
Source of truth for device and application health.
Request a Demo
What's Included:
- Device Health
- Measure device usage
- Security Posture
- Application Health
- Device Usage
- Geolocation
- Web Application Usage
- Endpoint Data Discovery
Absolute Control
Lifeline to protect at-risk devices and data.
Request a Demo
All Visibility capabilities, plus:
- Geofencing
- Device Freeze
- File Delete
- Device Wipe
- End User Messaging
- Remote Firmware Protection
Most Powerful
Absolute Resilience
Delivers application self-healing and confident risk response.
Request a Demo
All Control capabilities, plus:
- Application Resilience
- Remediation Script Library
- Investigations and Recovery of Lost/Stolen Devices
What's Included
- Strategic Ransomware Readiness Check
- Cyber Hygiene Baseline Across Endpoints
- Recovery Task Acceleration
- Remote Assistance
Secure Endpoint FAQ
Absolute Secure Endpoint is one of our company’s core product lines, which leverages the unbreakable connection provided by Absolute Persistence® to enable IT and security personnel to monitor and address computers' problems and enables the computers and their mission-critical applications to self-heal. This helps with IT management, strengthening a company’s security posture, and maintaining compliance.
The Absolute Secure Endpoint product portfolio contains a variety of product packages:
Other variants, such as Absolute Resilience for Student Devices, may be offered to meet particular use cases or geographic market needs.
Absolute Visibility is the entry service tier in the Absolute Secure Endpoint portfolio. Absolute Visibility collects data about the endpoints' location, security posture, and hardware/software inventory. It provides analysis of software, Web applications, and hardware utilization as well as identifies potential failure points, sensitive data, and suspicious use patterns.
Absolute Control is the mid-service tier in the Absolute Secure Endpoint portfolio. Absolute Control adds to Absolute Visibility’s capabilities to control endpoints over the Internet, allowing for critical functions such as remote file deletion and data wipe, freezing devices on demand when at-risk, end user messaging, as well as establishing geo-fences and alerts.
Absolute Resilience is the top service tier in the Absolute Secure Endpoint product portfolio and the most popular package among customers. Compared to Absolute Control, it adds further capabilities to secure endpoints from threats and vulnerabilities, respond to security breaches and incidents, and enable Application Resilience to automatically monitor and detect unhealthy applications and automatically heal them.
Absolute Ransomware Response is a stand-alone offering, which provides capabilities and services to assess an organization's ransomware preparedness and cyber hygiene across endpoints; ensures mission-critical security applications such as anti-malware and device management tools remain healthy and capable of self-healing; and expedites the quarantine and recovery of endpoints if a ransomware attack occurs.
Customers can easily upgrade/downgrade their service subscriptions between Absolute Visibility, Control, and Resilience. Capabilities are additive and enabled via a software license key.
Absolute Ransomware Response is offered as a stand-alone solution primarily for security-conscious customers. Add-on options are offered for Absolute Control and Resilience customers. Absolute Ransomware Response customers can later easily expand their capabilities by changing their subscription to the Absolute Resilience service tier.
Absolute can be purchased through leading device manufacturers, resellers, and distributors. Contact us and we would be happy to help you with this process.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join a product overview webinar
Secure Endpoint
Mitigating Zero-Day Threats in a Complex Cybersecurity LandscapeLive Webinar - Sept 17, 2024 | 9AM PT
Secure Access
Leveraging AI to Protect Against Modern Cybersecurity ThreatsLive Webinar - Oct 1, 2024 | 9AM PT
Not ready for a demo? Have some questions?