The Only Undeletable Endpoint Defense Platform

Secure your data, devices, and applications with an unbreakable connection to every endpoint – on or off your network.

Due to increasing security standards and compliance requirements, Companies across the USA and across the World are looking to upgrade and improve its existing cyber security systems to ensure devices and sensitive information remain protected. After a competitive review processes, Companies are choosing the Absolute platform, which enables full visibility into the location and status of all devices, including those that lack necessary security updates, and the ability to freeze or wipe devices if required.

With Absolute, customers are able to enhance its endpoint security posture by:
⦁   Protecting sensitive company and employee’s data across every endpoint, in any location, with a persistent connection to all devices;
⦁   Improving security and IT operations with fast discovery and remediation of any at-risk device; and
⦁   Responding to incidents faster with automatic location, device freezing, and deletion of data

About ABSOLUTE

Absolute serves as the industry benchmark for Endpoint Resilience, visibility and control. Embedded in over a half-billion devices, the company enables more than 12,000 customers with Self-Healing Endpoint® security, always-connected visibility into their devices, data, users, and applications – whether endpoints are on or off the corporate network – and the ultimate level of control and confidence required to support the modern enterprise.

ABSOLUTE solutions

There are several ways through which Absolute can help you:

  • Licenses- Absolute works with different levels of coverage, beginning with Absolute Visibility, which allows you to visualize all your assets, even if they are off your network; then there is Absolute Control, which grants you the capability to control all your endpoints with a persistent link; and also Absolute Resilience, with which your endpoints gain self-healing and reinstallation qualities to protect your information.
  • Analytics- Absolute hands you the report of the network activities regarding your devices, apps and software, so you can keep your investment safe.
  • Absolute Secure Access (formerly NetMotion)- This is the part of the equation where you can access any and all your devices and apps at any time, in a secure way, to analyze risks in real time.
      • ZNTA- Zero Trust Network Access is the key to uphold access policies throughout your endpoints and thus prevent the use (or misuse) of questionable applications or websites.
  • Absolute Ransomware Response- This solution makes your organization ready to manage any  ransom events and recover the entirety of your deployed endpoints.

For the latest information, visit  www.absolute.com 

F.A.Q.

Application Persistence is a unique self-healing capability for third party applications that is part of the Absolute platform. Application Persistence leverages Absolute Persistence®, technology already in embedded in over 1 Billion devices, to remotely remediate an application, making it resilient whether it is uninstalled, disabled or corrupted. As a result, the endpoint becomes self-healing. Application Persistence is currently available to the security industry ecosystem, including enterprises, security vendors and OEMs worldwide. Organizations of all sizes have already taken advantage of this technology to self-heal critical applications such as VPN, endpoint protection, device management, data protection and other internal business-critical applications.

In order for this solution to be implemented, the Absolute agent must be installed on each endpoint to activate Persistence. Based on the specific software application to be persisted and the policy determined by the administrator, the Absolute solution deploys policy files to the device to support the automatic, zero-touch reinstallation. Once setup is complete, Persistence will reinstall the software application agent whenever it is removed from a device or tampered with. Here is how it works:

1. The device calls into the Absolute Monitoring Center on a regular basis.

2. A custom agent script is retrieved and executed on the device.

3. An XML policy file, configured specifically, is downloaded to the device.

4. This policy file validates specified pre-deployment conditions (e.g. device type, operating system, device group):

a. If conditions are met, the correct application is already present on the device.

b. If conditions are not met, the application components are downloaded and installed as per policy file

Currently, Application Persistence is supported on devices running Windows 7 and higher. Android devices, including those with Persistence technology embedded, are not currently supported. The Absolute team continues to investigate methods to extend this capability to other desktop, laptop and mobile platforms.

Application Persistence is available for all supported applications through an Absolute subscription. Application health reporting is available through Absolute Visibility or Control, while application remediation is available with Resilience.

The list of supported applications available can be obtained from an Absolute Sales representative. The Absolute team continues to add new applications to the list on a quarterly basis. For a list of vendors, please visit:

Application Persistence

Schedule a Demo