Overview
Absolute Secure Endpoint Editions
Absolute Secure Endpoint offers a variety of product editions to choose from, tailored for your IT and security needs.
Absolute Secure Endpoint empowers IT and Security teams to deliver cyber resilience across endpoints and applications and recover from unexpected downtime caused by ransomware, other cyber threats or IT issues.
All major PC manufacturers including Dell, HP, Microsoft, and Lenovo embed Absolute Persistence technology in the firmware of their devices. Once activated, Persistence provides an undeletable tether across endpoints that is resistant to OS reimages, hard disk swaps and firmware updates. This empowers IT and Security teams with the visibility and cyber resilience needed to manage devices, address security gaps and recover from unexpected downtime.
NOTE: For Private Offer and Channel Partner Private Offer (CPPO) inquiries please contact our marketplace team at marketplace-offers@absolute.com .
Key capabilities:
- Absolute Persistence: Maintain undeletable connectivity to devices for unparalleled visibility.
- Application Resilience: Self-heal critical security apps such as EPP, EDR, DLP, SSE and others. Over 80 apps supported.
- Device Freeze: Quarantine lost, stolen or compromised devices to block malicious access.
- Geolocation and Geofencing: Locate devices and build geofences to be alerted when they breach approved boundaries.
- Endpoint Data Discovery: Identify files stored across devices containing sensitive data such as PII, financial information, customer data or corporate IP.
- File Delete and Device Wipe: Delete specific files, folders or the entire drive if necessary and obtain a sanitization certification for audits. Purge sensitive data before devices are decommissioned or reassigned to new users.
- Seamless and Proactive Patch Management: End-to-end streamlined patch management for OS and third-party applications including patch compliance reporting to monitor and reduce the time-to-patch.
- Remediation of Security Vulnerabilities through Automated Workflows: Continuous monitoring of security vulnerabilities. Responding with intelligent automation and workflows for remediation of vulnerabilities.
- Rehydrate: Remote restoration of compromised endpoints after a widespread IT or security incident such as ransomware to limit downtime to business operations.
Absolute Secure Endpoint consists of the following five product editions:
- Absolute Visibility: Serves as your source of truth for devices, applications and sensitive data.
- Absolute Control: Provides you a lifeline to protect at-risk devices by taking remote action.
- Absolute Resilience: Delivers application self-healing and confident risk response.
- Absolute Resilience for Security: Proactively assess patch health for known operating system and software vulnerabilities.
- Absolute Resilience for Automation: Respond quicker to security vulnerabilities through automated workflows.
Learn more about each product at https://www.absolute.com/platform/secure-endpoint and https://www.absolute.com/platform/compare-absolute-products/Â
Absolute Security is partnered with more than 28 of the worlds leading endpoint device manufacturers, embedded in the firmware of 600 million devices, trusted by thousands of global enterprise customers, and licensed across 16 million PC users. With the Absolute Security Cyber Resilience Platform integrated into their digital enterprise, customers ensure their mobile and hybrid workforces connect securely and seamlessly from anywhere in the world and that business operations recover quickly following cyber disruptions and attacks. Our award-winning capabilities have earned recognition and leadership status across multiple technology categories, including Zero Trust Network Access (ZTNA), Endpoint Security, Security Services Edge (SSE), Firmware-Embedded Persistence, Automated Security Control Assessment (ASCA), and Zero Trust Platforms.
Highlights
- Enforce Cyber Resilience: Assess security posture, maintain the uptime of security apps, and protect lost, stolen, or compromised devices. Rehydrate and recover devices back to a fully trusted and compliant state after an IT issue or cyberattack.
- Mitigate Risks and Protect Data: Comply with data and security regulations, identify and protect sensitive data, and respond to endpoint risks and non-compliance.
- Proactive & Automated Patch and Vulnerability Management: Assess OS & software patch health and respond quicker to security vulnerabilities through automated workflows.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
---|---|---|
Secure Endpoint Visibility | Absolute Secure Endpoint Visibility - Serves as your source of truth for device and application health. *Private Offer Only* MSRP $19.95 | $1,019.95 |
Secure Endpoint Control | Absolute Secure Endpoint Control - Provides you a lifeline to protect at-risk devices and data. *Private Offer Only* MSRP $39.95 | $1,039.95 |
Secure Endpoint Resilience | Absolute Secure Endpoint Resilience - Delivers application self-healing and confident risk response. *Private Offer Only* MSRP $59.95 | $1,059.95 |
Vendor refund policy
All orders are non-cancellable and all fees and other amounts you pay under this agreement are non-refundable.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
You can log a support ticket for any issues directly from the Secure Endpoint console or by contacting the Absolute support team at https://www.absolute.com/customers/support/contact/Â . KB articles, documentation, and support level/SLA information are available at
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products


