TEMPORARILY UNAVAILABLE
DISCONTINUED
Temporary Unavailable
Cooming Soon!
. Additional units will be charged at the non-eCoupon price. Purchase additional now
We're sorry, the maximum quantity you are able to buy at this amazing eCoupon price is
Sign in or Create an Account to Save Your Cart!
Sign in or Create an Account to Join Rewards
View Cart
Remove
Your cart is empty! Don’t miss out on the latest products and savings — find your next favorite laptop, PC, or accessory today.
item(s) in cart
Some items in your cart are no longer available. Please visit cart for more details.
has been deleted
Please review your cart as items have changed.
of
Contains Add-ons
Subtotal
Proceed to Checkout
Yes
No
Popular Searches
What are you looking for today ?
Trending
Recent Searches
Items
All
Cancel
Top Suggestions
View All >
Starting at

 

 

Absolute Secure Endpoint

Make your endpoints reliable and resilient for the modern workforce by leveraging the always-on connection provided by Absolute Persistence technology.

Make endpoints resilient

Detect and identify all assets on USB interfaces and component level visibility (Hardware BOM) for supply chain verification.

Protect at-risk devices

Instantly detect hardware-based attack tools that evade existing security solutions.

Always-on device connectivity

Establish trust and enforce hardware usage with granular risk-based access controls for continuous device verification.

Strengthen mission-critical apps

Utilize Absolute Application Resilience™ to automatically repair or reinstall mission-critical applications supported in the associated catalog to protect against common decay, software collision, unintentional deletion or malicious actions. Ensure the most used security controls and critical recovery tools, such as anti-malware, endpoint protection and unified endpoint management, work as intended.  

Safeguard your devices

Retain control over all your endpoints to alleviate risks before they become serious incidents. Take swift remedial action across at-risk endpoints using Absolute’s critical control functions, such as remote file deletion and data wipe, freezing devices on demand when at-risk, end- user messaging and establishing geofences and alerts. 

Enhanced endpoint visibility

Always have a direct line of sight to your endpoints, regardless of whether they are on or off the corporate network. Access a wide range of granular device data points such as hardware inventory details, installed software, device usage metrics, security vitals, geolocation, sensitive data discovery and Web app usage. Monitor historical dashboards to identify and respond to anomalies. . 

FAQ

Learn more about what Absolute has to offer. Our team is ready to assist you.