Endpoint Resilience
Endpoint Resilience keeps devices secure and operational, even in cyberattacks. Explore blog posts here featuring key insights on reducing vulnerabilities and ensuring continuous protection.
Most recent
Button TextAbsolute Secure Access Gets the Karlsruhe Public Transport System Going
Absolute Secure Access Gets the Karlsruhe Public Transport System Going

Absolute Achieves FedRAMP Ready Designation
Absolute has been designated FedRAMP Ready, at the moderate security impact level, and is now listed in the Federal Risk and Authorization Management Program Marketplace for US federal agencies and government contractors.

NIST Cybersecurity Framework Implementation Overview
Use these clear guidelines to implement the NIST's cybersecurity framework within your own organization.

Absolute highlighted among KuppingerCole leaders for ZTNA
Download Report: Absolute Highlighted Among KuppingerCole Leaders

Absolute Endpoint Data Discovery
Learn how Absolute Endpoint Data Discovery enables you to scan for sensitive files across your endpoints and to assess your organization’s data risk exposure.

Absolute Connector for Forescout eyeSight
This document answers questions about the Absolute Connector for Forescout eyeSight. Specifically, what are its benefits to customers and how it utilizes Secure Endpoint’s and Forescout’s capabilities.
.webp)
Introduction to Absolute Security
Welcome to Absolute, the industry standard for device visibility and resilience. This video explains who Absolute is and how our self-healing technology protects your PC, and the data that's on it, no matter where it is or who has it.

New innovation in endpoint security and resilience
Live preview of new Absolute Secure Endpoint Resilience Editions and Endpoint Rehydration.

Browse All

Tietoevry
Using Absolute Secure Endpoint, Tietoevry reduces costs, improves device visibility, and drives sustainability
Assala Energy
Using Absolute Secure Endpoint, Assala Energy Improves Visibility and Control Across Device Fleet

BW Offshore
Using Absolute Secure Endpoint, BW Offshore Improves IT Efficiencies and Asset Management

Smith Anderson
With Absolute Secure Endpoint, Smith Anderson Simplifies its Asset Management

NHS Royal Free London
With Absolute Secure Endpoint, Royal Free London NHS Trust Recovers 55 Missing Devices in One Year

GOAL High School
With Absolute Secure Endpoint, GOAL High School Ensures Students and Devices Remain Safe

Dailymotion
With Absolute Secure Endpoint, Dailymotion Ensures Remote Devices are Securely Protected

SAPOL
South Australia’s State Police Force Focuses on Secure Remote Access to Become More Efficient and Improve Their Ability to Serve the Community

VBK
Verkehrsbetriebe Karlsruhe GmbH Keeps Workers Connected With Absolute Secure Access

Leicestershire Police
The Police Force Empowers Its Officers With Remote Access Technology and Improves Their Ability to Serve the Public

Centre Hospitalier Universitaire
CHU Uses Absolute Persistence Technology to Reduce Device Theft

Waterloo Regional Police
Absolute Secure Access Helps the Waterloo Regional Police Service Make Managing Mobile Connectivity Easier

Ogletree Deakins
Ogletree Deakins Protects Its Systems and Data With Absolute Secure Endpoint

Los Angeles Tourism & Convention Board
The Los Angeles Tourism and Convention Board Meets It's Compliance and Endpoint Security Needs With Absolute Secure Endpoint

Sound Physicians
Using Absolute, Sound Physicians Improves Asset Management

Genpact
Genpact Uses Absolute’s Technology to Ensure Their Endpoint Security Controls Are Protected and Always Working

Royal College of Art
The Royal College of Art Implements Absolute Resilience to Ensure High Standards of Security Were in Place Across Its Entire Fleet of Windows-Based Devices

Duarte Unified School District
Duarte USD Leverages the Capabilities of Absolute Web Application Usage for Insight Into Student Activity

NHS
Trust Partnered with Absolute to Launch Initiative to Improve Visibility Across its Estate of Approximately 6,000 Laptops to Identify Unused and Unprotected Devices

Loudoun County Public Schools
Loudoun County Public Schools Minimizes Risk and Increases Device Utility with Absolute

Lantum
With Absolute Secure Endpoint, Lantum Increases Visibility and Control of their Device Fleet While Improving Compliance Scores

Rhode Island Blood Center
With Absolute Secure Endpoint, the Blood Bank is Able to Comply With Regulations and Reduce Risk in the Event Devices Are Lost or Stolen

Oregon State Police
Oregon State Police Improves Troubleshooting and Eliminates Connection Issues with Absolute Secure Access

PA Cyber
PA Cyber Leverages Absolute Endpoint Controls to Manage, Secure, and Recover Devices

Indiana Charter School Network
Using Absolute Secure Endpoint, the Indiana Charter School Network Was Able to Address Challenges Around Device Loss and Student Usage Monitoring

Surrey School District
The School System Uses Absolute to Make the Asset Management Process More Efficient and Improve Endpoint Security

Suffolk
Suffolk Construction Builds a More Secure Environment and Enhanced Asset Management Capability With Absolute Secure Endpoint

United States Environmental Protection Agency
U.S. Environmental Protection Agency Turns to Absolute Secure Endpoint to Address Asset Management Needs

Tullow Oil
Tullow Oil Chooses Absolute Secure Endpoint to Keep Critical Data Safe in the Event of Devices Being Lost or Stolen

Emergency Communications of Southern Oregon
Emergency Communications of Southern Oregon Leverages Absolute Secure Endpoint to Meet Compliance and Security Demands

Fresno Unified School District
Fresno Unified School District Solves Asset Management Challenges and Reduces Risk with Absolute

Euromonitor
Euromonitor Addresses Device Theft and Management Concerns with Resilient Endpoint Controls

Baltimore City Public Schools
School System Addresses Concerns Over Device Theft and Asset Management With Absolute

Bovis Homes
Bovis Homes Focuses on Endpoint Security and Asset Management to Solve Compliance Challenges

Asplundh
Asplundh Uses Absolute Secure Endpoint to Protect its Distributed Workforce, Data, and Devices

Allegis Group
Absolute Application Resilience Delivers the Reliability the Staffing Company Needs

CareSource
Absolute Secure Endpoint Provides the Protection CareSource Needs to Comply With Regulations and Help Keep Sensitive Information Safe

Dorset and Wiltshire Fire and Rescue Service
DWFRS Emergency Operational Capabilities Transformed by Secure Access to Vital Risk-Based Information at the Scene

Cayman Islands Ministry of Education
The Ministry Turned to Absolute to Address Challenges With Device Theft and Management and Uncovered Cost Savings and New Efficiencies

Implementing the NIST Cybersecurity Framework for Government
Discover how government CIOs and CISOs can optimize their approach to security and risk management.

NIST Cybersecurity Framework Implementation Overview
The National Institute of Standards and Technology (NIST)’s Cybersecurity Framework helps organizations like yours adopt formal security disciplines.

Absolute Persistence
Get to know Persistence, the only technology that keeps you in complete command with a self-healing, two-way connection to any endpoint or application — even off your network.

Securing and Enabling Your Remote Workforce
Keep your remote workers both secure and productive with a tried-and-tested strategy.

Two Options for Application Hardening and Resilience
Learn about application self-healing through Absolute Application Persistence and how it benefits software vendors when compared to other hardening methods.

Absolute Ransomware Response Playbook
Enable a confident, efficient, and reliable response in the event of a ransomware attack.

Securing the Future: Building a Resilient Zero Trust Strategy
Discover how Absolute Security strengthens every pillar of Zero Trust Architecture for Federal Agencies.

Guiding Federal Agencies to Compliance Faster
Your guide to achieving ZTA milestones efficiently and meeting federal mandates.

Strengthening Security and Compliance Posture through Cyber Resilience in Government

The Third Question: What CISOs Aren't Asking, and What's at Stake

Standardize your compliance reporting and control your remote devices

7 Steps to Protecting Data in the Era of Digital Care

Insights from an Industry Analyst: The Need for Resilient, Integrated Zero Trust

K-12 Peer Advice Forum: What’s Working for IT and Security Teams

3 Immediate Actions to Save Time While Managing Online Learning

Nailing It! 5 Ways to Win with the NIST Cybersecurity Framework

3 Essential Actions to Manage and Secure Remote Devices

Endpoint Resilience As A Proactive Security Strategy

Always-on Secure Tunnel: Establish Resilient and Persistent Remote Connections

Product Briefing: Critical Steps to Secure and Manage Your Remote Workforce

Empowering Organizations to Troubleshoot in a Remote Workculture

Endpoint & Network Visibility: Ensure visibility & control, even outside of the corporate network

Self Healing: Ensure the efficacy of your most valued security applications

Ransomware Readiness: Is your organization prepared for a possible attack?

Preparing your Device Fleet for the Economic Downturn

Zero Trust Architecture: Implement & maintain a strong security posture

Leveraging Device Visibility to Boost Your IT & Security Processes

Digital Experience Monitoring: Gain actionable insight

Application Persistence: How to Secure Your Security

Year-End Inventory and Device Collection Handbook
Learn best practices for device collection, including both communication and technology guidelines to seamlessly reclaim your district’s devices.

Absolute Assist Essentials for Secure Access
Make the most of your Secure Access environment through ongoing account engagement and technical enablement.

Absolute Endpoint Data Discovery
Learn how Absolute Endpoint Data Discovery enables you to scan for sensitive files across your endpoints and to assess your organization’s data risk exposure.

Absolute Device Wipe
Absolute Device Wipe enables organizations to wipe encrypted drives while adhering with NIST media sanitization guidelines. Ensure devices are securely sanitized for decommissioning purposes or to protect sensitive data.

Product Administrator Training & Certification Courses
Learn about Absolute Security’s Secure Access and Secure Endpoint official training and certification courses.

Absolute Secure Endpoint
Absolute self-healing, intelligent security solutions dynamically apply visibility, control, and self-healing capabilities to endpoints, applications, and network connections.

ITAM
Remote workforces and BYOD programs have added layers of complexity to IT asset management. Use Absolute to prove compliance, reduce asset losses, and drive efficiencies.

Absolute Control
Absolute Control provides a lifeline to protect as-risk devices and data.

NIST CSF Evaluation Guide
Get an overview of the NIST Cybersecurity Framework for a comprehensive checklist to boost compliance.

Chromebooks
Absolute for Chromebooks in Education lets small schools to large districts track, manage, and secure their Chromebooks, complementing the Google Admin Console.

Absolute Assist
Connect with a dedicated consultant to help you onboard Absolute, customize it for your business, and establish best practices for long-term success.

Absolute Endpoint Resilience Assessment
Evaluate the preparedness and recoverability of your endpoint fleet from potential disruptions.

Absolute Resilience
Absolute Resilience delivers application self-healing and confident risk response.

Absolute Onboarding
Jumpstart your journey to endpoint resilience through the Absolute Onboarding for Secure Endpoint program.

The Absolute Platform
The Absolute Platform delivers the foundational components that power Absolute product capabilities.

Secure Endpoint Health Check
Get more out of your Secure Endpoint implementation and ensure the overall health of your system is providing you with the efficiencies you need.

Absolute and Lenovo Security Assurance
Absolute Secure Endpoint leverages the always-on connection provided by Absolute Persistence® to allow IT and security personnel to monitor and address computers’ problems and enables the computers and their mission-critical applications to self-heal.

ServiceNow Integration Program for Absolute Security’s Secure Endpoint
Streamline your asset management and control by integrating Secure Endpoint with ServiceNow today!

Resilience for Student Devices
Asset Description: Absolute Resilience for Student Devices helps IT teams at K-12 school districts effectively manage, track, secure, and report on student Windows devices.

Absolute Product Overview
Absolute self-healing, intelligent security solutions dynamically apply visibility, control, and self-healing capabilities to endpoints, applications, and network connections.

Absolute DataExplorer
Absolute DataExplorer enables organizations to align device reporting to their specific business needs. Define and configure custom datapoints to be captured across your devices or choose to activate default datapoints available through the Absolute console.

Absolute Visibility
Absolute Visibility serves as your source of truth for device and application health.

Absolute Resilience for Automation
Automated remediation of operating system, software and security vulnerabilities to eliminate risk and reduce an organization’s attack surface.

Absolute Assist Essentials for Secure Endpoint
Make the most of your Secure Endpoint environment through ongoing account engagement and technical enablement.

Absolute Connector for ServiceNow
The Absolute Connector for ServiceNow enables users to access Absolute’s source of truth asset intelligence and execute device actions from within their ServiceNow platform environment.

Absolute Device Wipe
Absolute Device Wipe enables organizations to wipe encrypted drives while adhering with NIST media sanitization guidelines. Ensure devices are securely sanitized for decommissioning purposes or to protect sensitive data.

Absolute Application Health
Absolute Application Health enables you to track the health of business, productivity, and security applications across your endpoint environment.

Absolute Connector for Forescout eyeSight Solution Brief
The Absolute Connector for Forescout eyeSight enables joint customers to configure policies to continuously assess endpoint compliance before granting access to corporate resources.

ThinkShield Endpoint Visibility and Control
THREATS ARE ALL AROUND. They come from cybercriminals around the globe and even your most trusted employees. The reality is your endpoints are under constant cyber-security risks, on or off your network. Lenovo ThinkShield Endpoint Visibility and Control powered by Absolute is a cloud-based SaaS solution that maintains a constant device connection providing visibility to all your endpoints and the ability to remediate threats.

Absolute End User Messaging Workflow
Learn how to send messages to devices to inform end users about an upcoming event, warn them of a policy violation or to solicit information from devices or their respective end users.

Absolute Rehydrate
Remotely recover compromised endpoints to a fully trusted and compliant state after an IT or security event occurs.

Absolute Reach
Understand Reach's power to detect, understand, and remediate vulnerabilities across 100% of your endpoints on-demand, even off the corporate network.

Absolute Persistence
Get answers to common questions about Persistence, the factory-embedded technology that enables unprecedented endpoint security resilience.

Absolute for Chromebooks
Get answers to common questions about our security solution for Google Chromebook devices.
.webp)
Absolute Connector for Forescout eyeSight
Get answers to commonly asked questions about the Absolute Connector for Forescout eyeSight.

Absolute Endpoint Data Discovery
What is Endpoint Data Discovery? How does it work? Get answers to common questions about data visibility within the Absolute platform.

Absolute Application Health
Get answers to commonly asked questions about Absolute Insights for Endpoints, which empowers practitioners with historical asset management and security trends across their endpoint fleet via customizable dashboards and filters and targeted querying capabilities.

Absolute Device Wipe
Get answers to commonly asked questions about Absolute Device Wipe. Learn about how it functions, its use cases and the erasure standards it complies with.

Absolute for Chromebooks
Absolute enhances the Google Admin Console, extending its capabilities with comprehensive intelligence and control. Everything you need is at your fingertips: insights into device health, user behavior metrics, plus the ability to monitor, control, and protect student devices from a single console, on- or off-network.

Introduction to Absolute Secure Access
Welcome to Absolute Secure Access, the only secure access technology that actively self-heals and optimizes the end user experience. This video explains how Secure Access provides reliable network connectivity for users to gain secure access to critical resources in the public cloud, private data centers, or on-premises.

Introduction to Absolute Security
Welcome to Absolute, the industry standard for device visibility and resilience. This video explains who Absolute is and how our self-healing technology protects your PC, and the data that's on it, no matter where it is or who has it.

Absolute Secure Endpoint Editions
High level overview of Absolute's 3 Secure Endpoint editions: Visibility, Control and Resilience. We briefly discuss a few of the main features in each edition and go over how each edition builds on the other.

Fix Endpoint Vulnerabilities and Enforce Operating System Updates
Learn how Absolute Reach helps you automate and expand your IT capabilities, so you can respond efficiently to vulnerabilities and act quickly to protect your users, devices, and data - even off-network.

Automate Endpoint Management Tasks Remotely
See how Absolute Reach lets you automate and extend your IT capabilities off-network. Remotely gather information and perform critical actions like setting admin passwords and installing or uninstalling applications.

Absolute Security Named a Sample Vendor for ASCA by Gartner
Absolute Security Named a Sample Vendor for ASCA by Gartner

How to Apply Zero-Trust Principles to Strengthen Endpoint Security
How to Apply Zero-Trust Principles to Strengthen Endpoint Security

Frost & Sullivan Endpoint Security Radar 2023
Frost & Sullivan Endpoint Security Radar Adds Absolute’s Resilience Capabilities
The Third Question: What CISOs Aren't Asking, and What's at Stake
The Third Question: What CISOs Aren't Asking, and What's at Stake
The Value of Zero Trust in a WFA World
The Value of Zero Trust in a WFA World

Absolute highlighted among KuppingerCole leaders for ZTNA
KuppingerCole Report Leadership Compass for Zero Trust Network Access

Building Resilient Zero-Trust Capabilities
451 Research - Building Resilient Zero-Trust Capabilities
Strengthening Security and Compliance Posture through Cyber Resilience in Enterprises
Strengthening Security and Compliance Posture through Cyber Resilience in Enterprises
Strengthening Security and Compliance Posture through Cyber Resilience in Healthcare
Strengthening Security and Compliance Posture through Cyber Resilience in Healthcare
Strengthening Security and Compliance through Cyber Resilience in Public Safety
Strengthening Security and Compliance Posture through Cyber Resilience in Public Safety
Strengthening Security and Compliance Posture through Cyber Resilience
Strengthening Security and Compliance Posture through Cyber Resilience
Strengthening Security and Compliance through Cyber Resilience for Government
Strengthening Security and Compliance Posture through Cyber Resilience for Government
G2 Winter 2025 Report: Endpoint Management Software
Absolute Secure Endpoint Named Leader in Endpoint Management

Absolute Security Cyber Resilience Risk Index 2024
Security Risk Factors Negatively Impacting Enterprise Cyber Resilience

K-12 Peer Forum Offers Distance Learning Insight
Discover key insights from K-12 educational leaders on implementing effective distance learning strategies during unprecedented times.

Hundreds of IT Leaders Reveal That Full Remote Working Is Unlikely to Be the New Normal
Firms’ enthusiasm for scaling back on office space may have cooled slightly, with a new survey by professional services group KPMG suggesting that CEOs no longer intend to downsize their physical footprint after the COVID-19 pandemic.

Assessing ROI across multiple web applications
Discover strategies for evaluating return on investment (ROI) across various web applications, ensuring optimal resource allocation and enhanced security measures.

Absolute Software Secure Access Product Line Earns Leadership Position in KuppingerCole Zero Trust Network Access Leadership Compass
Absolute Software's Secure Access product line has been recognized as a leader in KuppingerCole's Zero Trust Network Access (ZTNA) Leadership Compass report, highlighting its robust capabilities in secure network connectivity and zero trust security.

Absolute Recognized as G2 Top 50 Best Security Product 2023, Ranked a Leader in Winter Grid Reports
Exciting news out of G2 this month as Absolute has been named to the Top 50 Best Security Products in the G2 Best Software Awards 2023.

Strengthening Device Management And Endpoint Security Just Got Easier With Absolute Power Of Resilience
This week, we announced that the power of Absolute’s Resilience solution and patented Absolute® Persistence™ technology now extends to more than 30 critical security applications – including, most recently, VMware® Carbon Black and Workspace OneTM as well as Crowdstrike® Falcon.

Apria Healthcare Sees And Secures 8,000 Devices With Absolute
With Absolute Persistence® already installed in the BIOS of their endpoint devices, Apria found unbreakable endpoint visibility and control by simply turning Persistence on.

Tracking Recovering Missing Devices After the Holidays
Not only is the holiday season prime time for thieves to stock up on valuable electronics left in airports, vehicles and cafes, but it’s also common for students and staff to misplace school-owned devices at home or while traveling

Absolute Ceo Christy Wyatt Recognized As Top 50 Women Leaders In Saas Of 2019
We’d like to congratulate all the 2019 leader awardees and give a special shout out to one honoree in particular – our CEO Christy Wyatt.

What Is Cyber Resilience And How Can You Achieve It
A cyber resilient company is in the best position to prepare for, respond to, and recover from a cyberattack. Being resilient, however, means much more than attack prevention or response.

4 Recent Data Breaches That Originated On The Endpoint
Let’s look at four recent breaches that originated on the endpoint to examine what you could do now to avoid a similar fate.

Quantifying K 12 Device Use With Absolute
Using Absolute, LCPS was able to provide quantitative information on device utilization rates right away.

What Is Endpoint Management?
Endpoint management ensures secure connections between devices and networks, protecting against cyber threats. Learn why it’s critical to safeguard your endpoints in today’s digital world.

How Experts Track Stolen Laptops
At Absolute, we have the Investigations and Recovery Team to track and recover lost and stolen devices on behalf of our customers. Since the team’s formation in 1993, we have helped customers around the globe recover more than 50,000 lost or stolen laptops over the years. In FY2018 alone, the team investigated more than 15,000 laptop incidents and successfully recovered 67% of them.

How To Protect Your Data If A Laptop Is Lost Or Stolen
When a device goes missing, so does all of the sensitive data that resides on it. Do you have a plan in place for tracking devices and securing your information?

Absolute Security Automates Remediation for CrowdStrike and other Windows BSOD Incidents
On July 19, 2024, CrowdStrike’s update caused a BSOD outage. Absolute Security provided tools to remotely repair affected endpoints and prevent future issues.

Forrester Recognizes Absolutes Self Healing Technology in the Future of Endpoint Management Report
According to Forrester there are 6 characteristics to ‘modern endpoint management.’ Leveraging them puts the focus squarely on seamless end-user experience and one way to do this is with self-healing technology from Absolute.

Demand for ZTNA continues its upward trajectory in 2022
Even as work from home mandates are rolled back, most organizations are finding that ‘work from anywhere’ policies are here to stay. With remote access becoming the norm, the priority for many IT teams has become sourcing secure access solutions that work for their teams.

Endpoints: The Weak Link in Your Security Posture
Getting a grip on proliferating devices with a remote workforce is challenging. To combat the many security gaps found in this landscape, you need a layered approach that includes access management, network security, and endpoint management. This is the foundation of zero trust.

Absolute Investigations April and May Device Recovery Success Stories
Devices on the go are a convenient way to stay in touch but unfortunately, they also have a high likelihood of being stolen. The Absolute Investigations Team consists of former law enforcement professionals who are trained to help navigate the circumstances of stolen property and recover stolen laptops.

How Hybrid Work Expands the Threat Surface
Today's organisations have to manage a disparate workforce who want to access company resources from numerous locations and numerous devices. Traditional, on-premise security tools are no longer enough.

Absolute Beta for Hyper-Resilient, Cloud-First ZTNA Deployment Architecture is Now Open
We’re excited to announce a new beta program for our hyper-resilient, cloud-first ZTNA architecture. Enrollment is now open.

The Power of Absolute Device Groups in Education
Schools need to manage a scattered device fleet and keep on top of security updates remotely, especially if your district relies on CARES or ARP Act funding. Absolute Device Groups allows IT to organize their devices into logical groupings.

When Data Insights Matter
As organizations continue to navigate the uncertainties of the new work-from-anywhere era, the one thing that has become more important than ever is data insights. In this context, Absolute is excited to announce two new product innovations.

5 Things to Look Out for to Avoid Buying a Stolen Laptop
Learn how to spot a stolen laptop and protect yourself from buying one. Ensure your devices are safe with these essential tips for secure purchases.

Absolute Launches Device Collection Service
Absolute can help make your school district’s device collection season as painless and hassle-free as possible.

Sound Physicians Secures Devices and Protects PHI with Absolute Resilience
Leveraging Absolute’s Endpoint Resilience™ capabilities, Sound Physicians gained an undeletable tether to every device

How To Guide Tracking and Recovering Laptops
Your data is at risk. Everyone—should know how to track, find, recover, or erase a laptop if needed.

The Best Laid Plans of Mice and Men Often Go Awry: A Look at High Profile Data Breaches
There has been plenty of hindsight-biased conclusions about how, if Okta got breached, they must have been doing something wrong. What there hasn’t really been a lot of is discussion about what, if anything, might have been done to prevent or mitigate such an attack.

Absolute Again Recognized as a Leader in G2 Grid Report for Endpoint Management
Absolute was named a leader in the Spring 2021 Grid Report for Endpoint Management published by G2 for the seventh consecutive quarter.

5 Cybersecurity Best Practices for K-12
While strong cybersecurity strategies may seem out of reach for some schools, the solution doesn’t have to be complicated. Here are basic steps every school should take to build a solid foundation.

Welcoming NetMotion to the Absolute Family and Delivering the Next Generation of Endpoint Resilience
In May, we announced that Absolute Software™ had entered into a definitive agreement to acquire NetMotion™. Today marks the completion of that transaction, and we are thrilled to officially welcome the talented NetMotion team into the Absolute family.

In a Work from Anywhere World Absolute Is Staying One Step Ahead With Industrys First Self Healing Zero Trust Platform
There are always going to be pros and cons when employees work from home versus working from an office. From an IT and security perspective, the distributed nature of today’s workforce has opened up a pandora’s box of potential issues.

Absolute Investigations August Roundup: Device Recovery Success Stories
Part of a laptop's attraction is its portability. IT's challenge is to keep track of them. Absolute customers benefit from an undeletable digital tether, no matter where the device is, and the Absolute Investigations Team.

What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security
Today’s largely-distributed enterprises need to make sure they are putting endpoint security first in 2021 which includes closely managing every stage of the device lifecycle.

How Fresno Unified School District Secures 100,000 Remote Learning Devices with Absolute Resilience
From device tracking to locating students to persisting key applications in the era of remote learning, Fresno Unified has seen significant ROI with Absolute Resilience.

New Education Endpoint Resilience Report Shows How New Normal is Bringing New Risks
The sudden shift to distance learning caused by COVID-19 created a significant spike in remote management, collaboration app usage and risk across K-12, new Absolute research reveals.

How Duarte Unified School District Manages Remote Learning With Absolute
When the COVID-19 outbreak hit and forced a new and unexpected learn-from-home environment on everyone, Duarte USD had to make some quick decisions including what constitutes effective and efficient web usage.

Absolute Named a Leader in G2 Spring 2023 Grid Reports for Endpoint Management and Zero Trust Networking
In the Spring 2023 G2 Grid Reports, users rank Absolute a leader in both endpoint management – for the 13th consecutive quarter - and in zero trust networking (ZTNA) for the third consecutive quarter. Learn why your peers love Absolute!

How The Platform Approach to Zero Trust Helps Organizations Strengthen Security, Reduce Complexity
Considering a zero trust strategy? Get the new report from Forrester that outlines core use cases, the business value it delivers, and the dynamics and vendors driving the market.

Absolute Security the Leader in Cyber Resilience
Discover how Absolute Security is reshaping endpoint protection and enabling businesses to build resilient infrastructures to withstand evolving cyber threats.

Absolute Software Recognized by Gartner for Enabling Automated Security Control Assessment
In the 2023 Gartner Hype Cycle, a new category has been citied for Resilience and Absolute is recognized as a Representative Vendor.

Absolute Secure Endpoint 8.0 Adding a New Level of Endpoint Resilience
Absolute Secure Endpoint 8.0 includes enhancements to the Absolute Console’s navigation flow, additional Device Usage events, discovering sensitive files across endpoints with greater flexibility, contextual Geolocation information and additions to the Application Resilience Catalog.

Discover the State of Your Cyber Resilience
Read Absolute’s 2023 Resilience Index to learn how you can achieve cyber resilience despite complexity .

Strengthening the Compliance and Security Posture in Healthcare
With cyberattacks on healthcare up 74%, protecting patient data is more important than ever. Learn how to navigate compliance and strengthen your cybersecurity strategy.

Applied Resilience with Absolute Secure Endpoint
Align cyber resilience goals to real-world threats and implement a strategy to adapt to multiple failure points if endpoint defenses are impaired during an attack.

Application Health Monitoring for Business Productivity and Security Applications
Introducing Absolute Application Health. Users can now monitor the health of over 2,000 of the most used Windows and Mac applications across enterprise organizations.

Survey Says UK CISO's Top Threats are Ransomware and Mobile Work
Explore key findings from the Absolute Security CISO Cyber Resilience Report 2024, highlighting concerns around cybersecurity and mobile workforce risks.

Obtaining Insights on Device Activity Across a Remote Endpoint Environment
With increasing endpoint complexity brought on by remote and hybrid work and more sophisticated cyber attacks, IT needs to continuously monitor endpoint events and identify unusual activity before it develops into greater security risks. Absolute Secure Endpoint's latest enhancements deliver seamless device monitoring.

The Accelerating Pace of Cyber Threats: A Historical Perspective
The rate of technology development has been accelerating for as long as technology has existed; there’s no reason why it should stop any time soon and there’s no reason why attack tools shouldn’t follow the same trend. To get an appreciation of how technological development has accelerated, Absolute CTO Nicko van Someren takes a look at the timelines.

Absolute Named Leader In G2 Fall 2019 Grid Report For Endpoint Management
Thanks to high levels of customer satisfaction and positive reviews from verified users, G2 has - for the second time this year - named Absolute a leader in the Fall 2019 Grid Report for Endpoint Management Software.

Minimizing Business Disruption A Discussion About Cyber Resilience on Nasdaq TradeTalks
Cyberattacks, the lasting impact they can have, and ways to achieve cyber resilience as we head into 2024 was the topic of a panel discussion featuring Absolute CEO Christy Wyatt on an episode of Nasdaq TradeTalks.

Strengthening the Compliance and Security Posture in Public Safety
Explore top strategies to strengthen compliance and security in public safety. Learn how to build resilience against evolving cyber threats.

Absolute Investigations Device Recovery Success Stories Fall 2023
Endpoints remain a leading gateway for cyber criminals across all industries. But when it comes to stolen laptops, Absolute customers have an important resource to lean on - the Absolute Investigations Team.

Absolute Honored with 5-Stars in CRN Partner Program and Women of the Channel Recognition
CRN®, a brand of The Channel Company, has awarded Absolute Software with a 5-star rating in the prestigious CRN Partner Program and named Absolute’s Director of Field & Partner Marketing, Americas, Jessica Morey to the Women of the Channel list for 2023.

Strengthening the Compliance and Security Posture in Enterprise
Secure enterprise cybersecurity compliance with proven strategies to protect data and streamline risk management. Discover secure solutions for enterprise.

Enhancing IT Efficiency and Cyber Resilience Through Automation
The Automated Actions capability empowers IT and Security teams to leverage automation as part of their IT and incident response practices to boost efficiency and cyber resilience.

Absolute Security Acquires Syxsense: Making Cyber Resilience Accessible to the Global Enterprise
Absolute Security has acquired Syxsense, the automated endpoint and vulnerability management solution to extend cyber resilience to the global enterprise.

Building Cyber Resilience: Insights from CyberWeek in Tel Aviv
What were the key takeaway's from CyberWeek in Tel Aviv? We've got them here...

Introducing New Resilience Capabilities to Strengthen Endpoint Cyber Resilience While Reducing Cost and Complexity
This blog post covers how the new Patch, Remediate, Automate and Rehydrate capabilities empower organizations to boost their cyber resilience through both proactive and remedial measure.

Are You Dealing with a False Sense of Cyber Security?
Spending more on security technology does not make you more secure. Instead, this approach drives up complexity and drives down application health, creating a false sense of security for many organizations. Learn more about how this imperils digital enterprises and what better options look like.

The Pressing Need for Self-Healing Apps and Network Resilience
Unlock the power of self-healing apps for enhanced security, reducing vulnerabilities and downtime while boosting cyber resilience across endpoints.

How to Achieve Cyber Resilience
How to build a resilient infrastructure that defends against attacks, zero day threats, and ensures fast recovery.

That's a Wrap! Absolute EMEA Cyber Resilience Roadshow
A host of IT professionals across multiple industries and sizes of organisations across EMEA joined us recently to hear from two cyber security experts on how ensuring you are well-armed to react efficiently and appropriately to get business back on track fast in the event of a breach.

Absolute Delivers Industrys First Mobile SSE
Ensure a secure browsing experience for all – desk, mobile, or hybrid users - with Absolute Secure Web Gateway, an add-on module that integrates with the policy capabilities in Absolute Secure Access.

Answers To Today's Toughest Endpoint Security Questions In The Enterprise
Knowing whether or not their endpoint security strategies are working keeps #CIOs up at night. Because you can't secure what you can't see, you need an undeletable tether.

Back to School: Safeguarding Student Data Privacy Must Be Top Priority This Year
As cyber threats rise in K-12 education, protecting student data and securing devices is more critical than ever. Learn how to improve endpoint security now.

Absolute Recognized by Cybersecurity Excellence Awards for its Excellence, Innovation, and Leadership in Information Security
We are excited to announce Absolute, a leader in Endpoint Resilience™ solutions, has been recognized in three categories in the 2021 Cybersecurity Excellence Awards.

Cybersecurity Awareness Series: Endpoint attack surface grows as vulnerabilities remain unaddressed
Absolute's 3-part cybersecurity awareness series empowers organizations with key indicators pulled from our technology that is embedded in the firmware of more than 600 million devices. In this post, we look at how organizations are keeping up with needed patching and compare that across industries.

How to Boost Your Resilience Against the Ransomware Epidemic in Healthcare
More than 90% of all healthcare organizations reported at least one security breach over the last three years in the United States.

Absolute Named Leader in Endpoint Management by G2 for Ninth Consecutive Quarter
We are excited to announce Absolute has been ranked a Leader in their Spring 2022 Grid® for Endpoint Management Software… again, for the ninth consecutive quarter!

Reliable Communications for the Work-from-Anywhere Era
IT practitioners are required to send timely communications with end users for a variety of reasons like upcoming events and security warnings. These communications are rarely simple and many result in low engagement. Enter Absolute's enhancements for End User Messaging.

In 2021, CIOs Must Do More with Less
In 2021, it will fall to CIOs to inform business leaders of the real risks involved and, as economic uncertainty continues alongside the ongoing pandemic, likely prepare to do more with less.

Building a Strategy for Endpoint Security and Student Privacy in 2021
With the start of the new school year just around the corner, how are you securing district devices and data? Here are 3 steps to get you started.

Absolute Investigations November Monthly Roundup: Device Recovery Success Stories
The Absolute Investigations Team has years of experience tracking down missing and stolen laptops.

The Parents’ Perspective: Insights into Distance Learning and Security
As we approach the mid-way mark of the 2020-2021 school year, distance learning remains an instructional delivery cornerstone for most schools in one way or another. How are we actually doing?

Enforcing Location Policies in Work- and Learn-from-Anywhere Environments
Discover effective strategies for enforcing location policies to protect remote devices and ensure cybersecurity compliance.

Absolute Investigations May & June Roundup: Device Recovery Success Stories
Summer ususally marks the start of more travel and where people go, so too do their laptops. Make sure you have the support of the Absolute Investigations Team before your chances for a missing laptop increase. Here's how we can help.

Bad Weather Ahead: The Parallels Between Cybersecurity and Enduring Winter
Cybersecurity is much the same as bad weather. We all have risks but the type and mitigation steps vary.

A Modern View on Achieving Risk-Based Compliance Strategy
Learn how a risk-based compliance strategy helps organizations strengthen cybersecurity in 2025. Protect sensitive data, ensure privacy, and manage risks effectively.

Application Persistence-as-a-Service: When Application Hardening and Resilience Matter
NEW! Absolute Application Persistence-as-a-Service (APaaS) allows any ISV to leverage Absolute’s firmware-embedded Application Persistence capabilities in their own software. Now their mission-critical applications are always installed, fully operational and working as intended.

Absolute Investigations October Roundup: Device Recovery Success Stories
The Absolute Investigations Team has been working with Absolute customers to recover stolen laptops since 1995. In September, our investigators celebrated the significant milestone of 55,000 recovered devices!

Emergency Connectivity Fund (ECF) Asset Management and Audit Preparedness Guide
For the many schools still struggling to meet the challenges of remote learning, the Federal Communications Commission announced a second window to submit projects for coverage under the Emergency Connectivity Fund. Here's a look at who's eligible and what's required.

Endpoint Resilience a ‘Critical Capability’ for Remote Work
As you further prioritize your digital transformation efforts, it’s important that you don’t forget one critical capability necessary for successful remote work – endpoint resilience.

The Critical Role of Endpoint Resilience In A COVID-19 World
Absolute is committed to doing its part in helping enterprise and educational institutions enhance their security postures amid COVID-created remote work and distance learning.

Cybersecurity: School’s Other Safety Concern
Secure your K-12 distance learning environment with Absolute. Combat cyber threats like phishing and ransomware with proactive security tools in 2025.

G2 Recognizes Absolute for 8 Straight Quarters for Endpoint Management and Zero Trust Networking
G2 has recognized both Absolute Software and NetMotion by Absolute as leaders in Endpoint Management and Zero-Trust Networking respectively, in its 2022 Winter reports.

Absolute Investigations November Roundup: Device Recovery Success Stories
When planning for 2022 budgets, many organizations will build in money for new devices. Laptops often represent a sizable percentage of that budget for many, and no one wants to have to factor in added cost for stolen devices.

Absolute Named a Leader in the G2 Grid Report for Endpoint Management, Again!
For the sixth consecutive quarter, Absolute has been named a Leader in the G2 Grid Report for Endpoint Management.

Dark Endpoints: An Invisible Threat to Your IT Team
Invisible devices create significant blind spots that can leave IT departments helpless to act against a breach until it is already too late. A new report from Absolute found 13% of enterprise devices aren't connected to the corporate domain.

4 Myths of Zero Trust
To separate marketing hype from reality, here are common myths and misconceptions around Zero Trust.

Absolute Investigations April Roundup: Device Recovery Success Stories
Our customers have the support of the Absolute Investigations Team. With years of experience working with law enforcement, their work has resulted in many impressive device recoveries.

What's in Store for Cybersecurity in 2023
As 2022 enters the rearview mirror, it is time to look forward. Here is what we think will be in store for cybersecurity in 2023.

Absolute Investigations Monthly Roundup: Device Recovery Success Stories
To recover stolen devices and at-risk data, Absolute customers not only have a firmware-embedded endpoint defense platform and undeletable digital tether they can rely on… they have also have the Absolute Investigations Team.

Introducing Resilient Zero Trust Security for the Work-from-Anywhere Perimeter
Discover strategies to strengthen remote access security and enhance endpoint resilience for hybrid workforces in 2025, boosting your cybersecurity defenses.

Absolute Investigations July Roundup: Device Recovery Success Stories
Remote work has greatly contributed to the rise of insider threats. Absolute customers benefit from an undeletable digital tether, no matter where the endpoint is, and the Absolute Investigations Team.

For Schools Seeking Stronger 1:1 Programs Absolute Introduces New Resilience for Student Devices
For districts to better manage here-to-stay 1:1 programs, Absolute has introduced Absolute Resilience for Student Devices.
Absolute’s CEO Christy Wyatt On The Future Of Endpoint Security
Resilient, self-healing, secure endpoints are what matters today and CIOs are recognizing complexity is a vulnerability. Absolute offers a permanent digital tehter to every endpoint and CISOs are noticing.

Making A Summer Plan for Student-Held Devices
For the districts who decided to leave devices with students for the summer, what should be done next to ensure a smooth learning experience this fall? Absolute customers already have the tools needed to support safe, effective learning, no matter where the devices are.

Absolute’s Third Annual Endpoint Risk Report Shows Lack of Visibility and Control is Leaving Enterprises Vulnerable
In Absolute's third annual Endpoint Risk Report, our goal was to provide a benchmark for enterprise risk analysis and a blueprint for action.

Public Saftey
Learn how Secure Access helps over 2,500 law enforcement agencies, first responders, as well as 911 dispatch and CAD.

Federal Government
Leverage Secure Endpoint to enable a digital federal government, maintain security controls, protect sensitive public data and comply with a variety of federal data regulations.

Higher Education
Colleges and universities need to square their need for information with compliance risks and cybersecurity threats. Strike the balance with Absolute's endpoint visibility and control.

Financial
Meet internal and regulatory requirements for data security on all your devices with Absolute's powerful suite of tools.

Government
Leverage Absolute to enable a secure digital government, and increase your IT and security efficiency, accuracy and confidence. Stay compliant on all your endpoints.

K-12 Education
See, manage, control and validate appropriate usage across your entire device population — whether they're Chromebook, Windows, or Mac devices.

Healthcare
Learn how Absolute gives you the power to identify potential security threats and respond rapidly before they become security incidents that require breach notifications.

Legal
Law firms are trusted with some of their clients' most sensitive data. Protect it — and your IT assets — with Absolute's unprecedented endpoint visibility and control.

Energy Utilities
As the energy industry becomes more complex and distributed, it's more crucial than ever to see and protect all your endpoints. Learn how Absolute can help.