Absolute Resilience
Make your endpoints and mission-critical applications cyber resilient


Achieve resilient, self-healing endpoints
Absolute is the world-leader and pioneer of endpoint resilience. Empower your organization to withstand and recover from cyber security threats and attacks on endpoints and installed, mission-critical applications.
Highlights
Absolute Resilience™ combines all the capabilities of Absolute Visibility™ and Absolute Control™ with critical resilience functions to secure endpoints from threats and vulnerabilities, respond to security breaches and incidents, and enable Absolute Application Resilience to detect unhealthy applications to autonomously self-heal them.
Make mission-critical applications self-healing
Leverage Application Resilience to automatically repair or reinstall mission-critical applications when they have been disabled, or are not running in a healthy state.
Remotely query and remediate devices at scale
Take remedial action across devices by leveraging a library of hundreds of customized scripts to accelerate your response and recovery efforts.
Identify sensitive information on devices
Discover sensitive data (e.g., PII, PHI, company IP) across your device fleet and identify devices that are syncing sensitive files with cloud storage services.
Investigate and recover stolen devices
Leverage the expert Absolute Investigation team to locate and recover stolen devices in collaboration with law enforcement.
Understand Web usage and Web app ROI
Determine your ROI for online tools and subscriptions by comparing usage patterns across your teams. Identify if devices are accessing unsecure or inappropriate websites or applications.

Remediate your devices remotely and at scale
Make your endpoints resilient to external factors
- Leverage Application Resilience to monitor mission-critical applications’ health and behavior; detect if missing, corrupted, or not running; and automatically repair or re-installs components when necessary – without requiring human intervention.
-
Query and remediate your whole device fleet to gather precise contextual insights. Address dark endpoints, ransomware attacks, and other vulnerabilities with automation and custom or pre-built Absolute Reach scripts.
Don’t let your devices become a liability
Minimize your risk exposure
- Scan your endpoints for sensitive data like financial information, social security numbers, or intellectual property. Know when it’s on an unsecured device, even off-network.
-
Let the Absolute Investigations team pair up with local law enforcement to lead the search for your lost or stolen devices.

Audit usage of Web tools and content
Gain insights and analyze ROI
- Detailed Web usage and ROI analytics demonstrate how users are leveraging Web tools to help you measure value. Identify access to inappropriate or unsecure content that may pose risks, compare usage patterns, and detect use of unapproved Web apps.
What our customers love about Absolute Resilience
"With Absolute, we can quickly assess and protect our endpoints… allowing us to keep safe the PHI that we are responsible for protecting."
Chris Schmidt
Manager of Information Security at Greenville Health System

Absolute Visibility
Serves as your source of truth for device and application health.
Request a Demo
What's Included
- Customizable dashboard, reports and alerts
- Measure device usage
- Automate hardware inventory
- Inventory installed software
- Assess security posture
- Monitor application health
- Locate and map your entire device fleet
Absolute Control
Provides you a lifeline to protect at-risk devices and data.
Request a Demo
All Visibility features, plus
- Draw geofences and detect unauthorized device movement
- Remote device freeze, on-demand or with offline timer
- Delete specific file or fully wipe the hard drive
- Enable firmware protection
- Secure, on-device end user communications
Most Powerful
Absolute Resilience
Delivers application self-healing and confident risk response.
Request a Demo
All Control features, plus
- Make critical applications self-healing
- Remotely scan for sensitive information
- Remotely run query or remediation scripts
- Track usage of Web apps and understand their ROI
- Investigate and recover stolen devices
Absolute Resilience Add-Ons
Absolute Insights for Endpoints™
Empowers your admins with fleet-wide device and security trends. Derive real-time asset and security insights across your endpoints to identify and respond to anomalies.
Absolute Missing Device Reclamation Service
Provides a team of Absolute reclamation experts to track, locate, and secure devices, including contacting users to get devices back.
Absolute Ransomware Response for Resilience
Augment your Absolute Resilience capabilities to gain an advantage for ransomware preparedness and recovery across your device fleet.
Featured Resources
Secure Endpoint FAQ
Absolute Secure Endpoint is one of our company’s core product lines, which leverages the unbreakable connection provided by Absolute Persistence® to enable IT and security personnel to monitor and address computers' problems and enables the computers and their mission-critical applications to self-heal. This helps with IT management, strengthening a company’s security posture, and maintaining compliance.
The Absolute Secure Endpoint product portfolio contains a variety of product packages:
- Absolute Visibility
- Absolute Control
- Absolute Resilience
- Absolute Ransomware Response
Other variants, such as Absolute Resilience for Student Devices, may be offered to meet particular use cases or geographic market needs.
Absolute Visibility is the entry service tier in the Absolute Secure Endpoint portfolio. Absolute Visibility collects data about the endpoints' location, security posture, and hardware/software inventory. It provides analysis of software and hardware utilization and identifies potential failure points and suspicious use patterns.
Absolute Control is the mid-service tier in the Absolute Secure Endpoint portfolio. Absolute Control adds to Absolute Visibility’s capabilities to control endpoints over the Internet, allowing for critical functions such as remote file deletion and data wipe, freezing devices on demand when at-risk, end user messaging, as well as establishing geo-fences and alerts.
Absolute Resilience is the top service tier in the Absolute Secure Endpoint product portfolio and the most popular package among customers. Compared to Absolute Control, it adds further capabilities to secure endpoints from threats and vulnerabilities, respond to security breaches and incidents, and enable Application Resilience to automatically monitor and detect unhealthy applications and automatically heal them.
Absolute Ransomware Response is a stand-alone offering, which provides capabilities and services to assess an organization's ransomware preparedness and cyber hygiene across endpoints; ensures mission-critical security applications such as anti-malware and device management tools remain healthy and capable of self-healing; and expedites the quarantine and recovery of endpoints if a ransomware attack occurs.
Customers can easily upgrade/downgrade their service subscriptions between Absolute Visibility, Control, and Resilience. Capabilities are additive and enabled via a software license key.
Absolute Ransomware Response is offered as a stand-alone solution primarily for security-conscious customers. Add-on options are offered for Absolute Control and Resilience customers. Absolute Ransomware Response customers can later easily expand their capabilities by changing their subscription to the Absolute Resilience service tier.
Absolute can be purchased through leading device manufacturers, resellers, and distributors. Contact us and we would be happy to help you with this process.
Like what you're hearing?
We’d love to show you how Absolute can secure and empower your organization.
Looking for more information? Join an upcoming product overview with live Q&A
Secure Endpoint
Ransomware Readiness: Is your organization prepared for a possible attack?April 11, 2023 | 8:30 AM PT
Secure Access
Zero Trust Architecture: Implement and maintain a strong security postureApril 25, 2023 | 8:30 AM PT
Not ready for a demo? Have some questions?