Thanks for your question, Matt! Glad to hear that you’re finding Absolute useful to protect your devices. Absolute provides a number of IT asset management and security capabilities. Are they any specific use cases that you’re trying to solve within your device environment? Happy to provide a quick overview of Absolute’s capabilities below.
On the IT side, you can view a variety of device data points such as hardware inventory details, installed applications, operating system version and updates details, geolocation and device usage metrics to name a few. You can then use this information to optimize your IT processes and boost ROI for your device and software investments.
On the security side, you can monitor the health of security applications you have deployed across your fleet such as anti-malware, encryption, VPN and endpoint detection and response (EDR) to name a few. Absolute’s Application Persistence feature then allows you to automatically repair or reinstall the application(s) whenever failures occur. Absolute also allows you to identify any sensitive data residing on your devices through Absolute’s Endpoint Data Discovery feature and take protective measures to alleviate any risk of the files being leaked.
You can utilize rules and alerts to proactively identify risks across your devices such as unauthorized movement, hardware changes or disabling of anti-malware or encryption and respond through a collection of remote actions including freezing or wiping a device or running a script. Absolute’s Reach feature provides a library of 130+ prebuilt scripts to choose from or to run any custom scripts you’ve developed.
Hope this helps! Do reach out if you'd like further information regarding specific use cases or features.
The Absolute Secure Endpoint product portfolio leverages the unbreakable connection provided by Absolute Persistence® to enable IT and security personnel to monitor and address computers' problems and
With over 2.5 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
or continue with
LinkedIn
Google
Google (Business)
Gmail.com addresses not permitted. A business domain using Google is allowed.