50 Smartest Companies Of The Year 2018

A Single Platform to Manage and Secure Any Endpoint, Powered By Persistence Technology Rooted In Your Device Firmware: Absolute


Absolute is the first and only company to offer uncompromised visibility and near real-time remediation of security breaches at the source. Embedded in more than a billion devices, its Absolute Persistence self-healing endpoint security technology gives IT pros complete control over devices and data. No other technology has the power to withstand user error or malicious attacks, and return devices to an original state of safety and efficacy.

Its cloud-based platform gives IT and security professionals absolute awareness and control of devices, data and applications — whether on or off the network or in the hands of an unauthorized user. With Absolute, you can enhance IT asset management, protect sensitive data, reduce insider threats, and ensure compliance.

How Absolute Does Business

Control is the bedrock of confidence. Absolute’s ability to give its customers self-healing endpoint security and complete visibility of their devices, data, users, and applications is the ultimate level of control and confidence for the modern enterprise.

Absolute Persistence is its unfair advantage. It gives any endpoint agent the ability to withstand user error or malicious attacks, and return to their original safe and effective state. This toughness and resolve are woven throughout all aspects of its business.

Absolute solutions also have zero impact on users, yet dramatically improve business productivity and security. This frictionless approach also extends to the way Absolute support its customers and conduct business.

“We make your entire enterprise stronger by building self-healing remediation technology throughout the greater security ecosystem. We are committed to advancing the state of endpoint security with Persistence as the foundation,” says Steve Munford, Interim CEO of Absolute.

The Absolute Platform

Visibility You Can Act On: Dark endpoints are breeding grounds for data breaches. Absolute introduces the new standard for endpoint visibility and control, already embedded in over 1 Billion endpoints for the always-connected visibility, insight and real-time remediation capabilities to stop breaches at the source.

Manage and Secure Every Endpoint, Everywhere: Absolute gives you the power to see, manage and secure every endpoint, everywhere. That’s because only Absolute is always-connected to every endpoint, unlike traditional endpoint security solutions that are constrained by network dependencies and contingent upon healthy endpoint agents. With Absolute, no endpoint device will ever go dark giving enterprises highly-assured IT asset management, self-healing endpoint security, and data visibility and protection.

Persistence Technology: Absolute leverages Persistence technology, already embedded in the firmware of over a billion popular endpoint devices, to deliver always-connected visibility and control with an efficient tether to every device, on and off the network.

Key Features

  • Reporting and Analytics: Collect and analyze incredibly rich information from each device, identify activities and precursors to security incidents, integrate this deep insight with SIEM and other enterprise solutions, or use its Security Posture Dashboard.
  • Geotechnology: Geofencing to monitor assets via Google Maps, including recent and historical locations. Create geofences based on corporate policies. Investigate devices entering unauthorized locations.
  • Risk Assessment: Pre-empt security incidents by delivering unparalleled insight into suspicious or anomalous activity. Validate and monitor the status of critical applications.
  • Risk Response: Use adaptive security measures to remotely recover or delete sensitive data. Set policies to ensure offline devices are automatically protected. Use certified data delete workflows to decommission a device. Prove sensitive data was not accessed at the time of the security
  • Reach Custom Query And Remediation: Rapidly query or remediate any device to eliminate vulnerabilities and regain compliance anytime, anywhere, on any endpoint.
  • Application Persistence: If a critical application is removed, disabled, or tampered with, Application Persistence initiates an automatic, zero-touch reinstallation so you can proactively eliminate vulnerabilities.
  • Data Awareness: Identify and remediate non-compliant data access. Discover sensitive data and assess the risk exposure. Detect Shadow IT and discover sensitive data synced with cloud storage applications. Avoid disruptive or network-restricted solutions and deploy zero-impact data protection.
  • Endpoint Investigations: Identify and eliminate insider threats. Leverage Security Professionals to determine the cause of an endpoint security incident. Refine best practices so the same incident does not reoccur. Determine if a data breach notification is required. Recover stolen devices.

Happy Clients

“We were able to provide the board with quantitative information about device utilization that drives consensus so the budget could be approved, and also peace of mind with security, privacy, and theft recovery.”

  • Rich Contartesi, CIO, Loudoun County Public Schools

“Once deployed across EMEA, many of our mobile devices may never return to head office so Absolute is very important because they allow us to keep track of hardware anywhere in the world. Also, we don’t have to spend so much time helping users set up their devices. It has taken away a lot of the work we used to do producing information and reports for the business.”

  • Tony O’Connor, Technical Support Agent, Network Operations, Premiere Global Services, Inc.

Meet the Chief

Steve Munford, Interim Chief Executive Officer: Steve Munford serves as Absolute’s interim CEO. He also holds the position of Non-Executive Director at Sophos, where he was CEO from 2006 to 2012. During that time he led the company through a period of dramatic growth, more than tripling bookings. Prior to his role as CEO, Steve served as President of Sophos for North America and then became Chief Operating Officer, responsible for the day-to-day running of the company and its senior management team.

Steve has a bachelor's degree in economics from the University of Western Ontario and has an MBA from Queen's University, Ontario.

 “We make your entire enterprise stronger by building self-healing remediation technology throughout the greater security ecosystem.”