Absolute Security Practices

Trust starts with transparency

Tens of thousands of customers use Absolute’s self-healing, intelligent security solutions to help strengthen their cyber resilience against escalating cyber threats. Because so many organizations rely on Absolute, we have to ensure that our own software, systems, and operations are as secure as possible. Doing this starts with a culture of security; we build security into each and every activity we perform, right from the start.

Security Information

Add title here
Security Processes

Absolute develops its software and deploys its systems using a set of security processes that allows us to build a safeguard in from the start and operate in a way that delivers consistent protection. These processes cover our Software Development Lifecycle, Operational Security, and our ongoing Testing.

Add title here
Vulnerability Reporting and Management

While we take every security precaution, it’s a sad reality that even the most watertight systems occasional encounter bugs. When issues do arise, we act as quickly as possible to address them, inform our customers in a timely manner, and credit those who have helped us find these issues.

Add title here
Known Vulnerabilities and Advisories

When vulnerabilities are brought to our attention, we fix them and notify customers. Once fixes are available, we release details of the vulnerabilities for the benefit of customers and researchers alike.

Add title here
Certifications

It’s not good enough for us to believe that our systems are secure - we need to be able to prove it. As a result, we periodically have our systems audited and certified against industry standards such as ISO-27001.