Absolute was founded in 1993 as a response to the problem of laptop theft and loss. Originally called “LoJack for Laptops” (and later Computrace) our mission was to create a track-and-trace solution that worked no matter what someone might do to the device.

In the early 2000s, we began to partner with device manufacturers. We had the privilege of being factory-embedded within the BIOS level of their firmware, making Absolute nearly impossible to remove.

This was a big step for us. But at the time, we had no idea how big it was.

That privileged position created something the world hadn’t seen yet: true resilience for a software agent. Whenever someone attempts to remove or reconfigure Absolute, it reasserts itself on the next boot sequence.

This technology, now called Persistence, allowed us to offer more and more value to our customers. Today, Absolute users can see all of their devices from a single pane of glass, remotely query and remediate them at scale, and even extend Persistence to the rest of their mission-critical applications, enabling true resilience across their organizations.

Absolute helps governments, corporations, agencies, educational institutions, and more to stay resilient in the face of growing and ever-changing cyber threats.

Enable resilience for your devices, apps, and data

All products of Absolute are built with Persistence™ Technology

Absolute Visibility

See all devices, on and off your network, and collect hundreds of hardware, software, security status, usage, and geolocation data points automatically, with 365 days of historical logs.

  • Customizable dashboard, reports and alerts
  • Measure device usage
  • Automate hardware inventory
  • Monitor installed software
  • Assess security posture
  • Monitor application health

Absolute Control

Detect when your endpoints enter an unauthorized area, and take remote action to remediate endpoints risks immediately by rendering devices useless or deleting the data they contain.

All Absolute Visibility features 

  • Detect unauthorized device movement
  • Remote device freeze, on-demand or with offline timer
  • Full or selective data delete
  • Enable firmware protection

Features & Products

Absolute Console
Cloud-based console, centralized dashboard, customizable widgets, pre-defined and customized reports and alerts, role-based access control, single sign-on, 2-factor authentication

Track Hardware
Report and alert on hundreds of hardware attributes, pre-built and custom reports, track new device activations and connection history, track the evolution of offline devices, flag missing devices and be alerted when they connect to the internet, track device location with 365 days of history

Measure Device Usage
Assess device usage based on device interaction events, report on daily average usage by device, and compare usage across different device groups to detect underutilized devices

Monitor Installed Software
Assess installed software on your devices to identify possible license non-compliance or waste, vulnerable apps or versions, policy non-compliance, and shadow IT or new user needs

Assess Security Posture
Report on encryption and anti-malware status across your device population, monitor evolution of encryption status over time

Monitor Health of Critical Applications 2
Report on the health status of critical applications, such as Endpoint Management, VPN, Endpoint Protection, or Data Protection

3rd-party Integrations
Integration with ServiceNow and SIEM tools

Detect Unauthorized Device Movement
Define geofences to detect unauthorized device movement and be alerted when a device crosses a geofence

Remotely Freeze Devices
Freeze a device with custom message – scheduled or on demand, set an offline timer to automatically freeze devices

Remotely Delete Data
Selectively delete files on any device, and perform an end-of-life device wipe with compliance certificate

Enable Firmware Protection 3
Create, remove, or change supervisor password remotely and at scale

Make Critical Applications Self-healing 2
Enable resilient endpoint security, by automatically repairing and reinstalling critical applications, such as Endpoint Management, VPN, Endpoint Protection, Data Protection, when they are found to be missing, disabled, or not running in a healthy state

Identify Sensitive Information on Devices
Discover PII, PHI, PFI, SSN, GDPR data and Intellectual Property on/off network, assess data risk, estimate cost of exposure, identify devices with sensitive files syncing with cloud storage (Dropbox, iCloud, Box, OneDrive)

Remotely Query & Remediate Devices at Scale
Leverage 130+ pre-built workflows from the Reach Library, and run any custom PowerShell or BASH script on one or multiple devices

Investigate and Recover Stolen Devices
Leverage the expert Absolute Investigations team to investigate and recover stolen devices in collaboration with law enforcement (Service Guarantee for unrecovered devices is only available to Education customers in North America, UK and Australia 4 )

Understand Web Usage 5
See what web content users are effectively focused on, as well as how often and for how long online tools are used, and identify if insecure or inappropriate content or websites are visited

Absolute Control Mobile App
Check the status of critical security controls on any device reported as lost or stolen, and freeze it immediately through the Absolute Control mobile app.

Google Play Store | Apple Store

2020 Cyber Catalyst Designated Solution
Organizations that adopt Cyber Catalyst designated solutions may be considered for enhanced terms and conditions on individually negotiated cyber insurance policies with participating insurers. Cyber Catalyst participating insurers rated Absolute Resilience highest on the criteria of key performance metrics, efficiency, and flexibility.

Applications supported directly through the product: Endpoint Management (Microsoft SCCM, VMware Workspace ONE, Tanium, Citrix Workspace, Ivanti Endpoint Manager), VPN (Cisco AnyConnect, F5 BIG-IP Edge Client, Pulse Secure, Palo Alto GlobalProtect, Netskope), Endpoint Protection (Dell Advanced Threat Prevention, VMware Carbon Black Cloud, ESET Endpoint Antivirus, CrowdStrike Falcon, McAfee ePO, Ziften Zenith), and Data Protection (Microsoft BitLocker, Dell Encryption Enterprise, Dell Data Guardian, WinMagic SecureDoc Encryption). Any other application of your choice may be supported through a Professional Services engagement, which can be quoted upon request.