Absolute Secure Endpoint
Make your endpoints reliable and resilient for the modern workforce by leveraging the always-on connection provided by Absolute Persistence technology.
✔
Make endpoints resilient
Detect and identify all assets on USB interfaces and component level visibility (Hardware BOM) for supply chain verification.
✔
Protect at-risk devices
Instantly detect hardware-based attack tools that evade existing security solutions.
✔
Always-on device connectivity
Establish trust and enforce hardware usage with granular risk-based access controls for continuous device verification.
Strengthen mission-critical apps
Utilize Absolute Application Resilience™ to automatically repair or reinstall mission-critical applications supported in the associated catalog to protect against common decay, software collision, unintentional deletion or malicious actions. Ensure the most used security controls and critical recovery tools, such as anti-malware, endpoint protection and unified endpoint management, work as intended.
Safeguard your devices
Retain control over all your endpoints to alleviate risks before they become serious incidents. Take swift remedial action across at-risk endpoints using Absolute’s critical control functions, such as remote file deletion and data wipe, freezing devices on demand when at-risk, end- user messaging and establishing geofences and alerts.
Enhanced endpoint visibility
Always have a direct line of sight to your endpoints, regardless of whether they are on or off the corporate network. Access a wide range of granular device data points such as hardware inventory details, installed software, device usage metrics, security vitals, geolocation, sensitive data discovery and Web app usage. Monitor historical dashboards to identify and respond to anomalies. .
FAQ
Absolute Secure Endpoint is a product line that leverages the unbreakable connection provided by Absolute Persistence to enable IT and security personnel to monitor and address computers' problems and enables the computers and their mission-critical applications to self-heal.
I. This helps with IT management, strengthening a company's security posture, and maintaining compliance.
The Absolute Secure Endpoint product portfolio contains a variety of product packages:
> Absolute Visibility
> Absolute Control
> Absolute Resilience
> Absolute Ransomware Response
Other variants, such as Absolute Resilience for Student Devices, may be offered to meet particular use cases or geographic market needs.
Absolute Visibility is the entry service tier in the Absolute Secure Endpoint portfolio. Absolute Visibility collects data about the endpoints' location, security posture, and hardware/software inventory. It provides analysis of software, Web applications, and hardware utilization as well as identifies potential failure points, sensitive data, and suspicious use patterns.
Absolute Control is the mid-service tier in the Absolute Secure Endpoint portfolio. Absolute Control adds to Absolute Visibility’s capabilities to control endpoints over the Internet, allowing for critical functions such as remote file deletion and data wipe, freezing devices on demand when at-risk, end user messaging, as well as establishing geo-fences and alerts.
Absolute Resilience is the top service tier in the Absolute Secure Endpoint product portfolio and the most popular package among customers. Compared to Absolute Control, it adds further capabilities to secure endpoints from threats and vulnerabilities, respond to security breaches and incidents, and enable Application Resilience to automatically monitor and detect unhealthy applications and automatically heal them.
Absolute Ransomware Response is a stand-alone offering, which provides capabilities and services to assess an organization's ransomware preparedness and cyber hygiene across endpoints; ensures mission-critical security applications such as anti-malware and device management tools remain healthy and capable of self-healing; and expedites the quarantine and recovery of endpoints if a ransomware attack occurs.
Lenovo Security Assurance (LSA) is a product offering which provides IT teams a real time dashboard to understand the state of their devices and critical applications. LSA utilizes Absolute’s Persistence® technology and Application Resilience capability, allowing practitioners to monitor the health of security products in their environment such as AV, Encryption, EDR, VPN, among others and self-heal them when failures occurs. Users can view an integrated dashboard of their environment and activate Application Resilience policies through the Absolute Console.
Learn more about what Absolute has to offer. Our team is ready to assist you.