Managing and Securing Your Chromebook Devices


With Chromebooks being the device of choice in the K-12 Education market and growing in prominence across commercial enterprises, IT and security teams require enhanced Chromebook visibility, as well as to be able to take remote actions when devices are lost or stolen. Learn how Absolute functions in tandem with the Google Admin Console to offer granular telemetry and scalable workflows to manage and secure your Chromebook fleet.
Key Highlights
- Leverage hardware inventory, device and Web usage telemetry to manage your devices and understand the ROI of Web app subscriptions.
- Remediate hardware issues and freeze devices if they don’t call in for a specified period of time.
- Send tailored messages to end users to help manage the annual device reclamation process, in advance of an upcoming IT event, in response to suspicious user activity, or to obtain user feedback.
Featured Webinars

3 Immediate Actions to Save Time While Managing Online Learning

Endpoint & Network Visibility: Ensure visibility & control, even outside of the corporate network

Cyber Resilience: Moving Beyond the Buzzword
Featured Speakers


Secure Endpoint FAQ
Absolute Secure Endpoint is one of our company’s core product lines, which leverages the unbreakable connection provided by Absolute Persistence® to enable IT and security personnel to monitor and address computers' problems and enables the computers and their mission-critical applications to self-heal. This helps with IT management, strengthening a company’s security posture, and maintaining compliance.
The Absolute Secure Endpoint product portfolio contains a variety of product packages:
- Absolute Visibility
- Absolute Control
- Absolute Resilience
- Absolute Resilience for Security
- Absolute Resilience for Automation
- Absolute Ransomware Response
Other variants, such as Absolute Resilience for Student Devices, may be offered to meet particular use cases or geographic market needs.
Absolute Visibility is the entry service tier in the Absolute Secure Endpoint portfolio. Absolute Visibility collects data about the endpoints' location, security posture, and hardware/software inventory. It provides analysis of software, Web applications, and hardware utilization as well as identifies potential failure points, sensitive data, and suspicious use patterns.
Absolute Control is the mid-service tier in the Absolute Secure Endpoint portfolio. Absolute Control adds to Absolute Visibility’s capabilities to control endpoints over the Internet, allowing for critical functions such as remote file deletion and data wipe, freezing devices on demand when at-risk, end user messaging, as well as establishing geo-fences and alerts.
Absolute Resilience is the third product edition in the Absolute Secure Endpoint product portfolio. Compared to Absolute Control, it adds further capabilities to secure endpoints from IT or security risks, respond to unexpected downtime due to security breaches and incidents, and enable Application Resilience to automatically monitor and detect unhealthy applications and automatically heal them.
Absolute Ransomware Response is a stand-alone offering, which provides capabilities and services to assess an organization's ransomware preparedness and cyber hygiene across endpoints; ensures mission-critical security applications such as anti-malware and device management tools remain healthy and capable of self-healing; and expedites the quarantine and recovery of endpoints if a ransomware attack occurs.
Customers can easily upgrade/downgrade their product subscriptions between Absolute Visibility, Control, Resilience, Resilience for Security and Resilience for Automation. Capabilities are additive and enabled via a software license key.
Absolute Ransomware Response is offered as a stand-alone solution primarily for security-conscious customers. Add-on options are offered for Absolute Control, Resilience, Resilience for Security and Resilience for Automation customers.

Absolute is the last stand in our IT security profile. I like how it integrates with the BIOS to do its thing most of all. Once installed, it is essentially a hands-off piece of software.