Absolute Secure Endpoint

Absolute Secure Endpoint leverages the undeletable connectivity provided by Absolute Persistence® to enable IT and security personnel to manage their devices, respond to security risks and protect sensitive data.

ConnectWise Certified Integration
Integrated seamlessly with the ConnectWise platform.
Introduction

Absolute Secure Endpoint empowers IT and Security teams to deliver cyber resilience across endpoints and applications and recover from unexpected downtime caused by ransomware, other cyber threats or IT issues.

All major PC manufacturers including Dell, HP, Microsoft, and Lenovo embed Absolute Persistence technology in the firmware of their devices. Once activated, Persistence provides an undeletable tether across endpoints that is resistant to OS reimages, hard disk swaps and firmware updates. This empowers IT and Security teams with the visibility and cyber resilience needed to manage devices, address security gaps and recover from unexpected downtime.

Highlights

Boost Operational Efficiency and Productivity

Optimize HW/SW inventory, improve continuity with apps, users and devices, monitor usage for ROI.

Enforce Cyber Resilience

Assess security posture, maintain security uptime, protect devices, and recover from incidents.

Mitigate Risks and Protect Data

Comply with regulations, identify & protect sensitive data, and respond to risks and non-compliance.

  • Overview

  • Integrations

  • Support

Absolute Secure Endpoint empowers IT and Security teams to deliver cyber resilience across endpoints and applications and recover from unexpected downtime caused by ransomware, other cyber threats or IT issues.

All major PC manufacturers including Dell, HP, Microsoft, and Lenovo embed Absolute Persistence technology in the firmware of their devices. Once activated, Persistence provides an undeletable tether across endpoints that is resistant to OS reimages, hard disk swaps and firmware updates. This empowers IT and Security teams with the visibility and cyber resilience needed to manage devices, address security gaps and recover from unexpected downtime.


Key capabilities:

  • Absolute Persistence: Maintain undeletable connectivity to devices for unparalleled visibility.
  • Application Resilience: Self-heal critical security apps such as EPP, EDR, DLP and SSE. Over 80 apps supported.
  • Device Freeze: Quarantine lost, stolen or compromised devices to block malicious access.
  • Geolocation and Geofencing: Locate devices and build geofences to be alerted when they breach approved boundaries.
  • Endpoint Data Discovery: Identify files stored across devices containing sensitive data such as PII, financial information, customer data or corporate IP.
  • File Delete and Device Wipe: Delete specific files, folders or the entire drive if necessary and obtain a sanitization certification for audits. Purge sensitive data before devices are decommissioned or reassigned to new users.

Absolute Secure Endpoint consists of the following three products:

  • Absolute Visibility: Serves as your source of truth for devices, applications and sensitive data.
  • Absolute Control: Provides you a lifeline to protect at-risk devices by taking remote action.
  • Absolute Resilience: Delivers application self-healing and confident risk response.


Learn more about each product at https://www.absolute.com/platform/editions/resilience/ and https://www.absolute.com/platform/compare-absolute-products/.


Absolute Security empowers mission-critical performance with advanced cyber resilience. Embedded in more than 600 million devices, our cyber resilience platform delivers security coverage for endpoint-to-network access, ensures automated security compliance, and enables operational continuity. Nearly 21,000 global customers trust Absolute to protect enterprise assets, fortify security and business applications, and provide a frictionless, always-on user experience.

Features:

Detect unauthorized device movement

- Define geofences to detect unauthorized device movement and be alerted when a device crosses an established boundary.

Remotely freeze at-risk devices

- Freeze devices when threats have been detected, and notify users with a custom message - automated or on demand.

Monitor Application Health

- Observe basic application health parameters across 2,000 Windows and Mac business, productivity, and security apps to detect any failures and analyze the root cause.

Remotely wipe device

- Remotely perform a cryptographic wipe with compliance certificate.

Integration is currently undergoing certification through the Invent Certified Integration Program.


You can log a support ticket for any issues directly from the Secure Endpoint console or by contacting the Absolute support team at https://www.absolute.com/customers/support/contact/. Additional support resources such as our Knowledge Base, product documentation and information on levels of support and SLAs are available at https://www.absolute.com/customers/support/technical-support-data-sheet/.

Details

Overview

Absolute Secure Endpoint empowers IT and Security teams to deliver cyber resilience across endpoints and applications and recover from unexpected downtime caused by ransomware, other cyber threats or IT issues.

All major PC manufacturers including Dell, HP, Microsoft, and Lenovo embed Absolute Persistence technology in the firmware of their devices. Once activated, Persistence provides an undeletable tether across endpoints that is resistant to OS reimages, hard disk swaps and firmware updates. This empowers IT and Security teams with the visibility and cyber resilience needed to manage devices, address security gaps and recover from unexpected downtime.


Key capabilities:

  • Absolute Persistence: Maintain undeletable connectivity to devices for unparalleled visibility.
  • Application Resilience: Self-heal critical security apps such as EPP, EDR, DLP and SSE. Over 80 apps supported.
  • Device Freeze: Quarantine lost, stolen or compromised devices to block malicious access.
  • Geolocation and Geofencing: Locate devices and build geofences to be alerted when they breach approved boundaries.
  • Endpoint Data Discovery: Identify files stored across devices containing sensitive data such as PII, financial information, customer data or corporate IP.
  • File Delete and Device Wipe: Delete specific files, folders or the entire drive if necessary and obtain a sanitization certification for audits. Purge sensitive data before devices are decommissioned or reassigned to new users.

Absolute Secure Endpoint consists of the following three products:

  • Absolute Visibility: Serves as your source of truth for devices, applications and sensitive data.
  • Absolute Control: Provides you a lifeline to protect at-risk devices by taking remote action.
  • Absolute Resilience: Delivers application self-healing and confident risk response.


Learn more about each product at https://www.absolute.com/platform/editions/resilience/ and https://www.absolute.com/platform/compare-absolute-products/.


Absolute Security empowers mission-critical performance with advanced cyber resilience. Embedded in more than 600 million devices, our cyber resilience platform delivers security coverage for endpoint-to-network access, ensures automated security compliance, and enables operational continuity. Nearly 21,000 global customers trust Absolute to protect enterprise assets, fortify security and business applications, and provide a frictionless, always-on user experience.

Integrations

Features:

Detect unauthorized device movement

- Define geofences to detect unauthorized device movement and be alerted when a device crosses an established boundary.

Remotely freeze at-risk devices

- Freeze devices when threats have been detected, and notify users with a custom message - automated or on demand.

Monitor Application Health

- Observe basic application health parameters across 2,000 Windows and Mac business, productivity, and security apps to detect any failures and analyze the root cause.

Remotely wipe device

- Remotely perform a cryptographic wipe with compliance certificate.

Support

Integration is currently undergoing certification through the Invent Certified Integration Program.


You can log a support ticket for any issues directly from the Secure Endpoint console or by contacting the Absolute support team at https://www.absolute.com/customers/support/contact/. Additional support resources such as our Knowledge Base, product documentation and information on levels of support and SLAs are available at https://www.absolute.com/customers/support/technical-support-data-sheet/.