Tune in to see how Absolute helps IT and Security Teams navigate the endpoint health, device usage, safety, and security challenges large k-12 school districts are facing across the country.
When it comes to recovering devices and the data stored on them, Absolute customers have a critically important resource to lean on: the Absolute Investigations Team.
Absolute Secure Endpoint and Absolute Secure Access have reached two important SOC 2 framework milestones for secure, robust systems.
Absolute Secure Access のポリシー機能と統合されたアドオン・モジュールである Absolute Secure Web Gateway サービスを使用すれば、デスク、モバイル、またはハイブリッド・ユーザーのすべてに安全なブラウジングエクスペリエンスを保証することができます。
Absolute Software Corporation is pleased to announce that its Security holders have approved the acquisition of all of the outstanding shares of the Company (the “Shares”) by 1414364 B.C. LTD., an affiliate of Crosspoint Capital Partners, L.P. (“Cros
Absolute Software today announced the company’s secure access product, NetMotion Mobility 12.14, has achieved Common Criteria Evaluation Assurance Level (EAL) 4+ – the highest certification level recognized internationally under the Common Criteria p
To ensure the highest levels of endpoint security across more than 8,000 devices and to help achieve HIPAA compliance in the face of rising data breaches across the healthcare industry, Apria Healthcare leverages Absolute for comprehensive endpoint v
Absolute announced that at its annual general meeting of shareholders held on December 13, 2016, each of the nine nominees listed below and described further in the Company’s management information circular dated November 10, 2016 were elected as dir
It's important for organizations to increase ransomware preparedness and assure that the tools needed for remediation, eradication, and recovery are not just in place, but also functioning as expected. Absolute Ransomware Response was developed based
AI-powered threat detection capability has been integrated into the Absolute Secure Access Security Service Edge (SSE) offering. AI Threat Insights module detects and acts against zero-day threats, ransomware, other malware, and suspicious user, devi