Retain command of all your endpoints, all the time – even if they’re off your corporate network
Take action to safeguard your devices, applications, and data
Endpoint visibility is important. However, it’s even more crucial to safeguard your devices, applications, and data based on what you’ve learned by gathering the truth across your endpoints. Endpoint control is the next step in your endpoint management and security strategy.
Absolute Control™ includes all the capabilities of Visibility™ plus critical endpoint control functions:
Detect unauthorized device movement
Define geofences to detect unauthorized device movement and be alerted when a device crosses an established boundary.
Remotely freeze at-risk devices
Freeze devices when threats have been detected, and notify users with a custom message - automated or on demand.
Remotely delete data
Selectively delete files on any device from anywhere and remotely perform an end-of-life device wipe in accordance with NIST 800-88 with compliance certificate.
Send secure, on-device end user communications
Inform users in a coordinated fashion by displaying important messaging in real-time on their devices’ screen or to solicit feedback even if their device has been compromised or other communication tools have been rendered inoperable.
Enable firmware protection
Create, remove, or change supervisor password remotely and at scale on specific Lenovo devices.
Safeguard your devices
Earn trust and prove compliance
- Freeze lost or stolen devices. Set geofences and timers to automatically trigger these actions whenever a device leaves a safe area or stops calling in.
Selectively wipe data from at-risk endpoints. Perform end-of-life device wipes remotely and generate compliance certificates.
Send secure, on-device end user communications
Reach your end users whenever needed
- Display important messaging on your users’ devices’, preventing unnecessary helpdesk support calls and fragmented communications. Avoid confusion when informing users of an upcoming IT event, providing instructions on how to avoid any imminent ransomware threats, or soliciting feedback through surveys.
- Enable continuous, real-time communication even when other communications tools are offline or have explicitly been rendered inoperable by malware or ransomware.
Enable firmware protection without bringing devices in
Remotely manage supervisor passwords
- Get unprecedented control over your endpoint security configurations — and prevent unauthorized changes to them — by remotely managing supervisor passwords for supported Lenovo devices.
What our customers love about Absolute Control
"As a CIO, Absolute gives me peace of mind so I can sleep at night. It has strengthened our security posture, allowing us to stay in compliance and giving us that extra level of comfort."
CIO at Asplundh
Looking for a Bigger Toolbox?
Absolute Control provides you a lifeline to protect at-risk devices and data. Explore the entire Absolute Secure Endpoint product portfolio to identify the service tier that meets your organization's needs. Check out Absolute Resilience™ to determine what service tier is right for you.
Serves as your source of truth for device and application health.
Request a Demo
- Customizable dashboard, reports and alerts
- Measure device usage
- Automate hardware inventory
- Inventory installed software
- Assess security posture
- Monitor application health
- Locate and map your entire device fleet
Provides you a lifeline to protect at-risk devices and data.
Request a Demo
All Visibility features, plus
- Draw geofences and detect unauthorized device movement
- Remote device freeze, on-demand or with offline timer
- Delete specific file or fully wipe the hard drive
- Enable firmware protection
- Secure, on-device end user communications
Delivers application self-healing and confident risk response.
Request a Demo
All Control features, plus
- Make critical applications self-healing
- Remotely scan for sensitive information
- Remotely run query or remediation scripts
- Track usage of Web apps and understand their ROI
- Investigate and recover stolen devices
Absolute Control Add-Ons
Absolute Insights for Endpoints™
Empowers your admins with fleet-wide device and security trends. Derive real-time asset and security insights across your endpoints to identify and respond to anomalies.
Absolute Missing Device Reclamation Service
Provides a team of Absolute reclamation experts to track, locate, and secure devices, including contacting users to get devices back.
Absolute Ransomware Response for Control
Augment your Absolute Control capabilities to gain an advantage for ransomware preparedness and recovery across your device fleet.
The Absolute Platform
Achieve true cyber resilience with the only factory-embedded endpoint security solution. Get to know the broad strokes of the platform and its impact.
Absolute Ransomware Response
Absolute Ransomware Response boosts ransomware preparedness and time-to-recovery.
Secure Endpoint FAQ
Absolute Secure Endpoint is one of our company’s core product lines, which leverages the unbreakable connection provided by Absolute Persistence® to enable IT and security personnel to monitor and address computers' problems and enables the computers and their mission-critical applications to self-heal. This helps with IT management, strengthening a company’s security posture, and maintaining compliance.
The Absolute Secure Endpoint product portfolio contains a variety of product packages:
- Absolute Visibility
- Absolute Control
- Absolute Resilience
- Absolute Ransomware Response
Other variants, such as Absolute Resilience for Student Devices, may be offered to meet particular use cases or geographic market needs.
Absolute Visibility is the entry service tier in the Absolute Secure Endpoint portfolio. Absolute Visibility collects data about the endpoints' location, security posture, and hardware/software inventory. It provides analysis of software and hardware utilization and identifies potential failure points and suspicious use patterns.
Absolute Control is the mid-service tier in the Absolute Secure Endpoint portfolio. Absolute Control adds to Absolute Visibility’s capabilities to control endpoints over the Internet, allowing for critical functions such as remote file deletion and data wipe, freezing devices on demand when at-risk, end user messaging, as well as establishing geo-fences and alerts.
Absolute Resilience is the top service tier in the Absolute Secure Endpoint product portfolio and the most popular package among customers. Compared to Absolute Control, it adds further capabilities to secure endpoints from threats and vulnerabilities, respond to security breaches and incidents, and enable Application Resilience to automatically monitor and detect unhealthy applications and automatically heal them.
Absolute Ransomware Response is a stand-alone offering, which provides capabilities and services to assess an organization's ransomware preparedness and cyber hygiene across endpoints; ensures mission-critical security applications such as anti-malware and device management tools remain healthy and capable of self-healing; and expedites the quarantine and recovery of endpoints if a ransomware attack occurs.
Customers can easily upgrade/downgrade their service subscriptions between Absolute Visibility, Control, and Resilience. Capabilities are additive and enabled via a software license key.
Absolute Ransomware Response is offered as a stand-alone solution primarily for security-conscious customers. Add-on options are offered for Absolute Control and Resilience customers. Absolute Ransomware Response customers can later easily expand their capabilities by changing their subscription to the Absolute Resilience service tier.
Absolute can be purchased through leading device manufacturers, resellers, and distributors. Contact us and we would be happy to help you with this process.
Take action and learn more
How to buy
Choose the Absolute product package that provides the benefits your organization needs.
Explore our use cases to learn how you can maximize the return on your tech investment with Absolute.
View all use cases
Take the tour
Sign up for a demo and learn how Absolute can empower your organization.
Request a demo
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join an upcoming product overview with live Q&A
Secure EndpointRansomware Readiness: Is your organization prepared for a possible attack?
April 11, 2023 | 8:30 AM PT
Secure AccessZero Trust Architecture: Implement and maintain a strong security posture
April 25, 2023 | 8:30 AM PT