Three versions of Absolute are available factory installed from Dell
Absolute Visibility:
- Hardware and software asset reports.
- Measure Device Usage.
- Monitor Installed Software.
- Assess Security Posture.
- Monitor Health of Critical Applications.
Absolute Control:
- Consolidate all devices, on or off the corporate network.
- View hundreds of hardware, software, usage and security data points.
- Geolocation to monitor device whereabouts.
- Monitor critical application health.
- Create geofences to flag risky devices.
- Remote device freeze, on-demand or with offline timer.
- Full or selective data delete.
Absolute Resilience:
All Absolute Visibility features +- Self-heal critical applications.
- Remotely scan for sensitive data residing on devices.
- Run custom or predefined Powershell and Bash scripts.
- Investigate and recover stolen devices.
The Absolute difference
Enhanced Device Visibility:
Always have a direct line of sight to your devices, regardless of whether they are on or off the corporate network. Through Absolute Persistence being embedded in the firmware of Dell devices, you have enhanced visibility across your fleet and the assurance of tamper proof connectivity even when the operating system is reimaged or hard drive is swapped. Leverage geo-technology to track device whereabouts and flag risk associated with devices going out of bounds.
Reporting and Analytics:
View multifaceted endpoint telemetry related to device hardware, software, usage, security vitals, sensitive data and application health. Identify precursors to non-compliant events by being alerted to changing data points such as IP address, hard drive serial number, operating system build, installed applications, geolocation and many more.
Automate Endpoint Resilience:
Ensure security applications such as VPN, Antivirus, Encryption and Data Loss Prevention are healthy and active across all your devices. Freeze a missing or stolen device to render it inoperable and protect it from potential thieves. Identify sensitive data residing on endpoints and run full or selective data delete to alleviate risk associated with data leakage. Run automated PowerShell and Bash scripts across devices related to common IT and security actions. Ensure compliance with regulatory frameworks such as GDPR, HIPAA and NIST.
Absolute provides a full complement of endpoint security features and remote capabilities so that you can control and secure business data and devices:





Absolute Visibility (Good) |
Absolute Control (Better) |
Absolute Resilience (Best) |
|
Absolute Console Cloud-based console, centralized dashboard, customizable widgets, pre-defined and customized reports and alerts, role-based access control, single sign-on, 2-factor authentication |
|||
Track Hardware Report and alert on hundreds of hardware attributes, pre-built and custom reports, track new device activations and connection history, track the evolution of offline devices, flag missing devices and be alerted when they connect to the internet, track device location with 365 days of history |
|||
Measure Device Usage Assess device usage based on device interaction events, report on daily average usage by device, and compare usage across different device groups to detect underutilized devices |
|||
Monitor Installed Software Assess installed software on your devices, leverage pre-built catalogs to identify software and suites, report and alert on software configuration changes or policy non-compliance |
|||
Assess Security Posture Report on encryption and anti-malware status across your device population, monitor evolution of encryption status over time |
|||
Monitor Health of Critical Applications * Report on the health status of critical applications, such as Endpoint Management, VPN, Endpoint Protection, or Data Protection |
|||
3rd-party Integrations Integration with ServiceNow and SIEM tools |
|||
Detect Unauthorized Device Movement Define geofences to detect unauthorized device movement and be alerted when a device crosses a geofence |
|||
Remotely Freeze Devices Freeze a device with custom message - scheduled or on demand, set an offline timer to automatically freeze devices |
|||
Remotely Delete Data Selectively delete files on any device, and perform an end-of-life device wipe with compliance certificate |
|||
Make Critical Applications Self-healing * Enable resilient endpoint security, by automatically repairing and reinstalling critical applications, such as Endpoint Management, VPN, Endpoint Protection, Data Protection, when they are found to be missing, disabled, or not running in a healthy state |
|||
Identify Sensitive Information on Devices Discover PII, PHI, PFI, SSN, GDPR data and Intellectual Property on/off network, assess data risk, estimate cost of exposure, identify devices with sensitive files syncing with cloud storage (Dropbox, iCloud, Box, OneDrive) |
|||
Remotely Query & Remediate Devices at Scale Leverage 130+ pre-built workflows from the Reach Library, and run any custom PowerShell or BASH script on one or multiple devices |
|||
Investigate and Recover Stolen Devices Leverage the expert Absolute Investigations team to investigate and recover stolen devices in collaboration with law enforcement (Service Guarantee for unrecovered devices is only available to Education customers in North America, UK and Australia 2 ) |
|||
Understand Web Usage * See what web content students are focused on, as well as how often and for how long online learning tools are used, and identify if students are visiting unsafe content or websites |
FAQ
- Windows 10 (32 & 64-bit)
- Windows 8.1 (32 & 64-bit)
- Windows 7 (32 & 64-bit)
- Mac OS X 10.9 to 10.14
- Android 4.4.2 - 9.0
Additionally, encryption is generally not well enforced industry wide. Absolute strengthens encryption (among other security tools such as Anti-Virus and VPN) by allowing you to monitor the health of the application across your fleet and the ability to self-heal critical components whenever non-compliance instances arise.
Absolute ensures visibility across all your devices, on or off the corporate network. Through a digital tether embedded in the firmware of Dell devices, you maintain a direct two-way connection even when the OS is reimaged or hard drive is swapped. Absolute also provides a range of device metrics, including hardware information, software deployed on devices, sensitive data residing on devices as well as security vitals such as Encryption and Anti-Virus.