On-demand Webinar
Remotely Recover Compromised Devices with Rehydrate
60 mins
Join Absolute product experts to learn about the Tech Preview for Rehydrate, an exciting new capability which enables IT and security teams to remotely recover affected devices after a potential IT issue or cyberattack such as malware or ransomware. This functionality will be included in the Resilience edition once released at no additional cost!
You’ll learn:
- Why Rehydrate is critical to responding to cyberthreats and limiting the impact on business operations, financial penalties and your organization’s reputation.
- How to remotely repair and restore affected devices, even when the OS has been compromised by malware, ransomware or an IT issue.
- How to deploy the trusted OS golden image to devices by adding or deleting remedial files or registry keys and executing batch scripts.
60 mins
This 60-minute session includes an overview of the functionality available with Rehydrate including an in-depth console demonstration. Following the demonstration there will be a dedicated Q&A session with our product experts!
*Accounts must be on the Control and Resilience tier to be considered for the Tech Preview.
Agenda
Featured Speakers

Eric Wheatley
Director, Product Management
Resilience (SME) | Absolute Security

Tim Laffan
Manager, Sales Engineering | Absolute Security
Tech Talks FAQ
Absolute Secure Access is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides resilient network connectivity for users to securely access critical resources in the public cloud, private data centers, and on-premises. These products allow users to transition from an optimized, secure tunnel to a resilient Zero Trust approach, without impairing productivity or admin controls.
Absolute Secure Access encompasses these products:
- Absolute Core provides security and confidentiality for data in motion by means of encryption and access controls. It also offers benefits to the end user, such as making tunnel and network sessions resilient and optimizing streaming video and audio.
- Absolute Edge provides a software-defined perimeter via Zero Trust Network Access, creating a context-based, logical access boundary around an application or set of applications – wherever they're hosted. It shields applications from the Internet, making them invisible to unauthorized users. Access policies are enforced at the endpoint, avoiding latency and any data transgression.
- Absolute Enterprise is a converged, resilient cloud-native SSE platform that includes Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Private Access (ZTNA), Data Loss Prevention (DLP) and Remote Browser Isolation (RBI) into a single platform. It also includes proactive anomaly detection (AI Threat Insights) and over 70+ dashboards of user, device, network, and application behavior (Insights for Network) as well as Endpoint Compliance that gives administrators additional visibility, control, and resilience over user devices.
- Absolute Insights for Network™ offers diagnostic and experience monitoring capabilities across endpoints and network, allowing organizations to proactively monitor, investigate, and remediate end user performance issues quickly and at scale, even on networks that are not company-owned or managed.
Absolute Secure Access packages are offered in three flavors: Absolute Core™, Absolute Edge ™, and Absolute Enterprise with the included products and capabilities as outlined below. Regional variations might be available.
- Absolute Core
- Secure, optimized tunnel
- ZTNA dynamic policy enforcement
- Network Access Control (NAC)
- Absolute Edge
- Includes Absolute Core, and adds:
- AI-powered web protection (“Shadow IT”)
- Absolute Insights for Network (70+ dashboards)
- AI Threat Insights
- Absolute Enterprise
- Includes Absolute Edge, and adds:
- Multiple AV scans
- Data Loss Prevention (DLP)
- Remote Browser Isolation (RBI)
- Content Disarm and Reconstruction (CDR)
- Endpoint Compliance
For Absolute Edge customers, Absolute offers the Absolute Secure Web Gateway Service (powered by Ericom) add-on module that tightly integrates with the extensive policy capabilities in Absolute Secure Access. It strengthens an organization’s security posture while improving end user experience.
Customers can easily upgrade their subscription between Absolute Core, Absolute Edge, and Absolute Enterprise. Capabilities are additive and enabled via a software license key.
Absolute Enterprise converges Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Private Access (ZTNA), Data Loss Prevention (DLP) and Remote Browser Isolation (RBI) into a single platform. Absolute Enterprise provides real-time data and threat protection against advanced zero-day and cloud-enabled threats and offers Endpoint Compliance that enables additional visibility, control, and resilience on devices.
Absolute Secure Access supports Apple® iPad and iPhone devices (iOS 11 and later), Apple MacOS (10.13 and later), Android devices (running on Android 5.0 or later), Android for Work, Samsung KNOX, Windows Pro Tablets, laptops, and other devices running Windows 8, 10, and 11.
"We had been searching for a solution like Absolute Secure Endpoint for many years. Now that we have implemented it across the organization, we’ve saved a tremendous amount of time tracking down devices while protecting the sensitive data on them. I would absolutely recommend Absolute."
Leo Puentes, IT Manager, L.A. Tourism
Tech Talks On-Demand
Check out our collection of Tech Talk recordings, for more in-console demos and tips and tricks for getting the most value out of Absolute.