Secure Endpoint

Secure Access

Compare Absolute Product Packages

Choose the Absolute product package that provides the solutions your organization needs.

  Absolute Visibility Absolute Control Absolute Resilience Absolute Resilience for Security Absolute Resilience for Automation
 

Serves as your source of truth for device and application health.


Provides you a lifeline to protect at-risk devices and data.


Delivers application self-healing and confident risk response.


Provides seamless and proactive patch management.

Offers remediation of security vulnerabilities through automated workflows.
Track hardware          
Report and alert on hundreds of hardware attributes
OS Support:
Monitor device leasing reports
OS Support:
Track new device activations and connection history
OS Support:
Leverage pre-built and custom reports
OS Support:
Flag missing devices and be alerted when they connect to the internet
OS Support:
Track Installed Software          
Report on installed software by device or population
OS Support:
Capture Device Insights          
Collect Absolute defined data points from the DataExplorer Library1
OS Support:
Configure the collection of custom data points tailored to specific needs using the DataExplorer Builder
OS Support:
Assess Device Security Posture          
Encryption status reporting
OS Support:
2
Anti-malware status reporting
OS Support:
Measure Device Usage          
Assess device usage by analyzing login/unlock and device interaction events
OS Support:
Report on average daily usage by device
OS Support:
Report on visited websites and understand the ROI from Web Apps in your environment3
OS Support:
Identify Sensitive Files On Devices          
Discover PII, PHI, PFI, SSN, GDPR data and Intellectual Property on/off network
OS Support:
Perform data risk assessment with estimated cost exposure
OS Support:
Identify devices with sensitive files syncing with cloud storage (Dropbox, iCloud, Box, OneDrive)
OS Support:
Monitor Device Location          
Track device location with 365 days of history
OS Support:
Define geofences to detect unauthorized device movement
OS Support:
Remotely Freeze Devices          
Freeze a device with custom message – scheduled or on demand
OS Support:
Set an offline timer to automatically freeze devices
OS Support:
Freeze a device via the firmware for an extra layer of protection4
OS Support:
4
Remotely Delete Data From Devices          
Selectively delete files
OS Support:
Perform an end-of-life device wipe with compliance certificate
OS Support:
Enable Firmware Protection          
Manage supervisor password at scale5
OS Support:
Secure, On-Device End User Communications          
Inform users by displaying important messaging on their devices’ screen or to solicit feedback
OS Support:
Query and Remediate Devices Immediately at Scale          
Run 130+ prebuilt workflows from Reach Library
OS Support:
Run Custom Powershell or BASH scripts on devices
OS Support:
6
Application Health Reporting          
Monitor basic application health parameters across 2,000 Windows and Mac business, productivity, and security apps to detect any failures and self-mitigate.7
OS Support:
Advanced monitoring of the application health of a select group of mission-critical security apps with automated mitigation capabilities.8
OS Support:
Make Critical apps covered in the application resilience catalog self-healing8          
Check out the Absolute Application Resilience catalog to find out the range of mission-critical applications covered9
OS Support:
Other applications10
OS Support:
Investigate and Recover Stolen Devices          
Recover stolen devices
OS Support:
Service Guarantee for devices not recovered11 (Education only)
OS Support:
Rehydrate          
Remotely recover affected devices in response to unexpected disruptions due to IT or security incidents
OS Support:
Utilize Absolute defined recovery playbooks that run via the firmware to bring devices back to fully trusted and compliant state
OS Support:
Patch Management          
Unified assessment of OS patch health across devices and automated deployment
OS Support:
Patching across a veriety of third-party applications
OS Support:
Patch compliance reporting across security frameworks and data regulations
OS Support:
Security Vulnerability Assessment and Remediation          
Scan for security vunerabilities and misconfigurations and detect a protential breach before it occurs
OS Support:
Access an extensive library of prebuilt remediation workflows to secure devices at the push of a button
OS Support:
Automated Workflows          
Build and deploy custom workflows using the visual and intuitive automation workflow builder with no coding required
OS Support:
Build multi-step actions to reestablish control and eliminate risk at the endpoint
OS Support:
Automate policies to detect behavioral and state changes on endpoints in real-time and execute self-healing workflows to harden endpoints and improve compliance
OS Support:
Absolute Platform Features          
Absolute Persistence
OS Support:
Rules & Policy Engine
OS Support:
Alerts
OS Support:
Dashboards
OS Support:
API Library13
OS Support:
Cloud-based console
OS Support:
Predefined and customized alerts
OS Support:
Role-based access control
OS Support:
Single sign-on
OS Support:
2-factor authentication
OS Support:
Absolute Connector for ServiceNow®
OS Support:
Universal SIEM connector
OS Support:
Absolute Connector for Forescout eyeSight
OS Support:
Automated Actions
OS Support:
Accelerated Device Actions14
OS Support:
  Visibility Control Resilience Resilience of Security Resilience for Automation

Download the Full Product Comparison Chart | View features for Chromebooks

Security Focused Product

Ransomware Response

Absolute Ransomware Response enables organizations to assess their endpoint ransomware preparedness, monitor their endpoint cyber hygiene, and expedite ransomware recovery.


Learn more

Compare Absolute Secure Access Products

Comprehensive, resilient SSE solutions with Safe Connect and Compliance for optimized, secure access to private apps, cloud, and web

  Core Edge Enterprise
       
Resilience      
Always-on application connections and advanced, undeletable client with embedded firmware technology
Endpoint Compliance      
Report and alert on hundreds of hardware attributes
Flag missing devices and be alerted when they connect to the internet
Assess security posture, including Anti-Malware and Encryption status, and monitor the health of other mission-critical applications
Freeze a device on demand with a custom message
Strengthen your Absolute Secure Access deployment through self-healing
Zero Trust Network Access (ZTNA)      
Secure optimized tunnel 
Advanced Client with always-on secure connectivity using tunnel and application session persistence and resilience
Universal ZTNA with granular policy enforcement at the endpoint, giving admins visibility and enforcement inside and outside the tunnel
Network Access Control to ensure comply-to-connect and enable warning, quarantine, or remediation on non-compliance
Distributed Firewall on each endpoint for a strengthened security posture against intrusions
Application persistence and resilience for always-on and always-protected business operations
Digital Experience Monitoring (DEM)      
Dashboards for monitoring and reporting with data retention of 90 days
User and Entity Behavior Analytics (UEBA)      
Proactive AI- and ML-based UEBA on user, device, network, and application behavior to identify suspicious activity before it becomes a problem
Internet Access (Secure Web Gateway)      
Secure Web Gateway (SWG) for protection against zero-day attacks, malware, and malicious code for hybrid, mobile, and field workers
Web Reputation and URL categorization to minimize risky website activity and protect organizations against malware
SSL/TLS inspection for increased scrutiny of low-risk traffic that may be hiding malware
Integrated DLP to prevent inadvertent or malicious insider uploads of sensitive data or information
Advanced Threat Protection      
Inline AV scan & malware detection for known malware, trojans, and spyware
Remote Browser Isolation (RBI) to safely render content in a cloud container away from the endpoint
Content Disarm and Reconstruction (CDR) to scan and sanitize documents from hidden malware
Cloud Access Security Broker (CASB)      
CASB inline for protection of SaaS applications
CASB Shadow IT to guard against unsanctioned applications

Buy through our partners

Our system manufacturer partners, certified network of distributors, telecom carriers, and value-added resellers are here to help you to purchase and successfully deploy Absolute’s self-healing, intelligent security solutions.

Find a Channel Partner

Take action and learn more

Like what you're hearing?

We’d love to show you how Absolute can secure and empower your organization.

Financial Services