
Absolute Resilience for Security ensures critical security controls are always active and self-healing. It provides automated remediation and continuous monitoring to protect against vulnerabilities, ensuring robust endpoint security and compliance.
Vendor
Absolute
Company Website

Absolute Resilience for Security
Automated patch management and endpoint recovery.
Streamlined Patch Management
Ensure routine patching happens smoothly and efficiently with minimal impact on users. Easily identify out-of-date or vulnerable software and use context-based prioritization to maximize protection for sensitive data. Prevent unauthorized access with streamlined testing and roll out.
Highlights
Absolute Resilience for Security™ offers automated endpoint patching and recovery to prevent exploitation and disruption. It combines all the capabilities of Absolute Visibility™, Absolute Control™, and Absolute Resilience™ with Patch Management.
Gain Uninterrupted Visibility
Scan for out-of-date operating system and third-party software wherever your endpoints are and avoid non-compliant devices.
Faster Patch Deployment
Streamline patch testing and application with automation and schedule maintenance windows to reduce disruption to users.
Context-based Prioritization
Intelligently target patches with the highest risk to keep your environment safe and compliant.
Minimize Operational Downtime
Respond quickly to cyber threats and IT issues with the rehydrate capability to minimize downtime.
Rehydrate Compromised Endpoints
Remotely recover devices back to a fully trusted and compliant state to get your business back up and running faster and prevent lateral attack movement.
Streamlined Patch Management
Seamless assessment of patch health for automatic detection and deployment
- Sophisticated patch scanning detects operating system and software vulnerabilities for Windows, Mac and Linux devices.
- Flexible scheduling of patch deployments to protect end user productivity.
- Automatic patch availability within 24 hours for operating system and third-party applications (e.g. Adobe, Chrome, Zoom etc.).
Recover endpoints quickly
Accelerate endpoint recovery after an IT issue or cyberattack to a fully trusted and compliant state.
- Firmware-based endpoint recovery playbooks bypass the operating system if tampered with, including options like rehydrating from a trusted OS image, modifying files/registry keys, and executing scripts.
- Passcode-protected “break-glass” mechanism runs at bootup to download and execute recovery playbooks, ensuring secure recovery.
- Management and status tracking of recovery playbooks through the Absolute Console, with role-based access controls for certified users.