On-Demand Webinar
Product Demo Series
Empowering Organizations to Troubleshoot in a Remote Workculture
Duration: 1 hour
In today’s work-from-anywhere environment, device and security risks can appear from a variety of different sources. IT and security teams are expected to swiftly troubleshoot potential risks before they progress into more serious security incidents. Learn how you can utilize Absolute’s remediation capabilities to identify and respond to device risks and vulnerabilities to maintain your organization’s security posture, lower helpdesk costs, and assure employee productivity.
Key Highlights
- Customize alerts to identify device performance issues or security risks and build geofences to be alerted when devices breach approved location policies.
- Utilize the Absolute Reach library containing 130+ pre-built scripts to respond to a variety of risks and vulnerabilities.
- Scan for files containing sensitive data (e.g. PII, PHI, credit cards details, corporate IP, etc) and delete specific files to reduce your organization’s data exposure.
Watch now
Agenda
Featured Speakers
Host
Neeraj Annachhatre
Senior Global Product Marketing Manager
Absolute Security
Brian Carmenatty
Sales Engineer
Absolute Security
Secure Endpoint FAQ
Absolute Secure Endpoint is one of our company’s core product lines, which leverages the unbreakable connection provided by Absolute Persistence® to enable IT and security personnel to monitor and address computers' problems and enables the computers and their mission-critical applications to self-heal. This helps with IT management, strengthening a company’s security posture, and maintaining compliance.
The Absolute Secure Endpoint product portfolio contains a variety of product packages:
Other variants, such as Absolute Resilience for Student Devices, may be offered to meet particular use cases or geographic market needs.
Absolute Visibility is the entry service tier in the Absolute Secure Endpoint portfolio. Absolute Visibility collects data about the endpoints' location, security posture, and hardware/software inventory. It provides analysis of software, Web applications, and hardware utilization as well as identifies potential failure points, sensitive data, and suspicious use patterns.
Absolute Control is the mid-service tier in the Absolute Secure Endpoint portfolio. Absolute Control adds to Absolute Visibility’s capabilities to control endpoints over the Internet, allowing for critical functions such as remote file deletion and data wipe, freezing devices on demand when at-risk, end user messaging, as well as establishing geo-fences and alerts.
Absolute Resilience is the top service tier in the Absolute Secure Endpoint product portfolio and the most popular package among customers. Compared to Absolute Control, it adds further capabilities to secure endpoints from threats and vulnerabilities, respond to security breaches and incidents, and enable Application Resilience to automatically monitor and detect unhealthy applications and automatically heal them.
Absolute Ransomware Response is a stand-alone offering, which provides capabilities and services to assess an organization's ransomware preparedness and cyber hygiene across endpoints; ensures mission-critical security applications such as anti-malware and device management tools remain healthy and capable of self-healing; and expedites the quarantine and recovery of endpoints if a ransomware attack occurs.
Customers can easily upgrade/downgrade their service subscriptions between Absolute Visibility, Control, and Resilience. Capabilities are additive and enabled via a software license key.
Absolute Ransomware Response is offered as a stand-alone solution primarily for security-conscious customers. Add-on options are offered for Absolute Control and Resilience customers. Absolute Ransomware Response customers can later easily expand their capabilities by changing their subscription to the Absolute Resilience service tier.
Absolute can be purchased through leading device manufacturers, resellers, and distributors. Contact us and we would be happy to help you with this process.
What our customers love about Absolute
“Absolute is the last stand in our IT security profile. I like how it integrates with the BIOS to do its thing most of all. Once installed, it is essentially a hands-off piece of software.”
Senior Network Administrator
IT Manager, G2 Review