The Absolute Resilience Platform

Delivering self-healing, intelligent security solutions at scale.

Platform Overview

Foundational components that power Absolute products

The Absolute Resilience Platform enables organizations to boost their cyber resilience to protect their digital environment against today’s sophisticated cyber threats. It comprises of Endpoint Resilience, Access Resilience and Application Resilience, offering a three-pronged approach in securing devices, data, connectivity and applications while empowering employees with reliable end-user experience to be productive.

The backbone of the Absolute Resilience Platform is the self-healing ability powered by Absolute Persistence™ technology, embedded in the BIOS of PCs shipped by the leading device manufacturers at the factory. This ensures IT and security teams maintain unparalleled connectivity and visibility across their remote and geographically dispersed endpoints. This self-healing mechanism also extends to third-party security applications and network connectivity, strengthening the organization’s security posture and end-user experience

Absolute Products

Absolute Security's two product portfolios, Secure Endpoint and Secure Access, offer comprehensive protections from threats from the device to the application.

Add title here
Secure Endpoint

Reliable, resilient endpoints for the anywhere workforce. Proactive and remedial measures to secure your endpoints against security risks, vulnerabilities and exposures.

Add title here
Secure Access

Comprehensive Security Service Edge (SSE) solutions with zero-trust policy enforcement, security controls, and threat protection across web, cloud, and private apps.

Our Products: Secure Endpoint

Consolidated endpoint, patch and vulnerability management

Strengthening resilience across your remote endpoints.

Add title here
Absolute Visiblity

Gain foundational visibility across your endpoints to manage your devices, applications, users and data – on or off the corporate network. Track device hardware, software, sensitive data, usage, security vitals and more and be alerted to suspicious activity and compliance drift.

Add title here
Absolute Control

Take action and respond to device or security risks. Create geofences to be alerted when devices breach approved boundaries, freeze devices when they are lost or stolen, perform a wipe or file delete to protect sensitive information, send messages to end-users and manage the supervisor password

Add title here
Absolute Resilience

Harden endpoints and respond to IT or security incidents to reduce downtime. Monitor app health and self-heal critical security agents, query and remediate devices at scale, investigate and recover lost or stolen devices and restore compromised devices back to a fully trusted and compliant state after an incident

Add title here
Absolute Core

Efficiently manage the deployment of patches with minimal impact on users. Proactively scan for and deploy operating system and third-party patches, prioritize devices and patches with the highest risk to keep your environment secure and schedule patch deployments in maintenance windows to reduce end-user disruption and maintain productivity

Add title here
Absolute Edge

Consolidate patch and vulnerability management across your environment. Scan for and respond to operating system, software and security vulnerabilities and misconfigurations through automated remediation workflows. Build custom workflows to respond to specific exposures using a visual and intuitive workflow builder.

Add title here
Absolute Ransomware Response

Boost ransomware preparedness and receive guidance from the Absolute Professional Services team to respond effectively when an incident occurs. Assess your security posture, identify and remediate the health of your endpoint management and security applications, provide tailored communication to end-users and freeze devices to limit the spread of infection.

Our Products: Secure Access

Comprehensive SSE portfolio optimized for hybrid, mobile, and field workers

Secure, resilient access to web, cloud, and private applications.

Add title here
Absolute Core

Resilient Zero Trust Network Access with dynamic policy enforcement and Network Access Control (NAC) for always-on secure connections to public and private applications regardless of the user’s location.

Add title here
Absolute Edge

Includes all the functionality in Absolute Core and adds in-line CASB, Digital Experience Monitoring (DEM) and Network Performance Diagnostics and Management (NPMD), and AI- and ML-powered proactive threat notifications for organizations that need more visibility and security.

Add title here
Absolute Enterprise

Includes all the functionality in Absolute Edge and adds comprehensive Secure Web Gateway (SWG) capabilities including multiple AV scans, Remote Browser Isolation (RBI), Content Disarm and Reconstruction (CDR), Data Loss Prevention (DLP), and Endpoint Compliance for complete visibility and security for today’s modern workforce.

What our customers love about Absolute

Even if the device gets wiped or someone wipes the BIOS, wherever you plug the hard drive in, it will embed itself back into the firmware, and vice versa. That was the differentiator between Absolute and any other product that is out there.

Kevin Turnbull - Global IT Director, Assala Energy
Read the Full Story

Frequently Asked Questions

The Absolute® Platform leverages a cloud-based, highly-available and secure multi-tenant architecture that is available across different regions. It’s comprised of a variety of foundational components that power Absolute product features that are being leveraged by the company’s enterprise customers and ecosystems partners (e.g., independent software vendors, original equipment manufacturers, or managed service providers) alike.

The Absolute Platform consists of three core components:

  • Absolute Persistence Technology

Absolute Persistence® technology, a unique, patented technology is already embedded in over 600 million devices as a result of Absolute’s partnership with nearly 30 system manufacturers from around the world. Once activated, this technology is fiercely resilient and is the only solution to survive attempts to disable it, even if the device is re-imaged, the hard drive is replaced, or the firmware is updated.

No other technology can do this. Ultimately, it provides a secure, unbreakable, and always-on connection between the Absolute Platform and the endpoint, allowing you to gain unprecedented real-time visibility, control, and remediation capabilities.

  • Absolute Resilience Technology

The Absolute Platform utilizes two types of patented Absolute Resilience™ technology to ensure that mission-critical applications remain healthy and operational and to provide end users with the most productive, as well as optimized remote access experience possible:

  • Application Resilience™: Monitors mission-critical applications’ health and behavior; detects if missing, corrupted, or not running; and automatically repairs or re-installs components when necessary – without requiring human intervention. Application Resilience ensures security controls are working as expected and provides optimal user experience by fixing unhealthy applications. Currently more than 60 mission-critical applications are enabled for Application Resilience and more are being added frequently.
  • Network Resilience™: Monitors and automatically, as well as transparently restores and optimizes unhealthy network connections so networked applications continue to operate without end user-impacting interruptions that would otherwise require manual application restarts, network re-connects, and/or re-authentications. Network Resilience allows for superior connectivity and reliability, allowing end users to focus on their tasks and not network behavior.
  • Absolute Intelligence

Absolute ensures a digital tether to each device remains intact, providing you with reliable insights and intelligence from all of your endpoints to the network edge — on or off your corporate network.

Hundreds of data points are gathered and served up as insights, providing guidance on utilization, health, security and compliance posture, as well as a unified view into the entire end user experience. Applying AI-based risk assessment and user entity behavior analytics lets you go beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.

Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:

  • Web console
  • Mobile app
  • Rules and policy engine
  • Alerts
  • Dashboards
  • APIs
  • Application Persistence-as-a-Service SDK
  • Third-party integrations (e.g., SIEM, ITSM)

Customers can leverage the Absolute Platform components through Absolute’s packaged products, APIs, and SDKs. The result will be rapid innovation. The Absolute Platform is always included in the product package of choice.