
Absolute Resilience for Automation offers automated remediation of security vulnerabilities, minimizing risk and reducing an organization's attack surface. It combines features like vulnerability assessment, pre-built remediation workflows, and custom automation to ensure swift and effective responses to security threats.
Vendor
Absolute
Company Website
Absolute Resilience for Automation
Respond quicker to security vulnerabilities through automated workflows.
Automate the remediation of security exposures
Security vulnerabilities and misconfigurations can crop up from a variety of sources such as the operating system, deployed software, network or firewall settings and weak passwords. Leverage automation to seamlessly identify and respond to exposures to ensure your attack surface is minimized.
Highlights
Absolute Resilience for Automation™, the highest edition of the Secure Endpoint product, offers automated remediation of operating system, software and security vulnerabilities to eliminate risk and reduce an organization’s attack surface. It combines all the capabilities of Absolute Visibility™, Absolute Control™, Absolute Resilience™ and Absolute Resilience for Security™ with two additional critical features, Remediate and Automate.
Detect Varied Security Exposures
Scan for operating system, software and security vulnerabilities, misconfigurations, blind spots to detect a potential breach before it occurs.
Deploy Remediation Scripts
Access an extensive library of prebuilt remediation workflows for thousands of existing vulnerabilities to secure devices at the push of a button.
Build Automated Workflows
Visually define custom remediation workflows with multi-step actions using the intuitive automation workflow builder.
Respond to Zero-Day Vulnerabilities
Swiftly react to disclosed vulnerabilities once patches are available to limit exposure.
Policy Automation
Detect behavioral and state changes on endpoints in real-time and execute self-healing workflows to harden endpoints and improve compliance.
Prioritize Patches by Risk
Intelligently target patches with the highest risk to keep your environment safe and compliant.
Minimize operational downtime
Respond quickly to cyber threats and IT issues with the rehydrate capability to minimize downtime.
Rehydrate Compromised Endpoints
Remotely recover devices back to a fully trusted and compliant state to get your business back up and running faster and prevent lateral attack movement.
Identify and respond to security vulnerabilities
Minimize your attack surface that can be exploited
- Combine patch and vulnerability management using live, real-time data to eliminate both operating system vulnerabilities and security weaknesses.
- Access thousands of workflows for existing vulnerabilities directly through the Absolute Console as well as updated content as new vulnerabilities are discovered.
- Respond to a variety of other security weaknesses like user account misconfigurations, insecure passwords, out of date anti-virus or definitions, disabled firewalls and open ports.
Build automated remediation workflows
Leverage the intuitive workflow builder
- Visually define custom workflows using the automated workflow builder without requiring any coding. Deploy complex remediations that would otherwise require advanced scripting.
- Build multi-step actions using the builder to reestablish control and eliminate risk at the endpoint.
- Leverage the unique Persistence technology embedded in the firmware of PCs as well as a unique endpoint management architecture providing real time visibility to reliably scan for and respond to threats.
Recover endpoints quickly
Accelerate endpoint recovery after an IT issue or cyberattack to a fully trusted and compliant state.
- Firmware-based endpoint recovery playbooks bypass the operating system if tampered with, including options like rehydrating from a trusted OS image, modifying files/registry keys, and executing scripts.
- Passcode-protected “break-glass” mechanism runs at bootup to download and execute recovery playbooks, ensuring secure recovery.
- Management and status tracking of recovery playbooks through the Absolute Console, with role-based access controls for certified users.