Absolute Security Solutions for the Public Sector
-
Absolute Secure Endpoint
The Absolute Secure Endpoint product portfolio leverages the always-on connection provided by Absolute Persistence to enable IT and security personnel to monitor and address computers' problems as well as enabling the computers and their mission-critical applications to self-heal. This helps with IT management, strengthening a company’s security posture, and maintaining compliance.
Within this product line, we offer three product editions:
- Absolute Visibility
- Collects data about the endpoints' location, security posture, and hardware/software inventory, as well as helps identify sensitive information on devices. It provides analysis of software and hardware utilization and identifies potential failure points and suspicious use patterns.
- Absolute Control
- Adds to Absolute Visibility’s capabilities to control endpoints over the Internet, allowing for remote file deletion and data wipe, freezing devices on demand when at-risk, as well as establishing geo-fences and alerts.
- Absolute Resilience
- Adds further capabilities to secure endpoints from threats and vulnerabilities, and to respond to security breaches and incidents. It ensures that devices are self-aware of the environment and resilient to changes, e.g., by self-healing mission-critical applications.
-
Absolute Secure Access
The Absolute Secure Access product portfolio delivers a modern remote access solution that provides security without sacrificing productivity. Besides providing reliable network connectivity for users to gain secure access to critical resources in the public cloud, private data centers, or on-premises, it proactively improves employee productivity and provides an exceptional experience for both users and IT administrators.
- Absolute Core
- Provides security and confidentiality for data in motion by means of encryption and access controls. It also offers benefits to the end user, such as making tunnel and network sessions resistant and optimizing streaming video and audio.
- Absolute Edge
- Adds to Absolute Core’s capabilities to deliver a Security Service Edge optimized for mobile and hybrid work models. It helps establish a software-defined perimeter via Zero Trust Network Access, ensures secure web browsing experiences for all via an optional Secure Web Gateway, and profiles the security of networks that end users connect to, identifying and preventing potential data leaks and man-in-the-middle attacks.
- Secure Web Gateway
- The Absolute Secure Web Gateway Service is an add-on module that tightly integrates with the extensive policy capabilities in Absolute Secure Access, strengthening an organization’s security posture while improving the end user experience. It defends organizations from viruses, attacks, and unsafe content delivered via Web browsers by safely inspecting and scrubbing Web content in a cloud container before delivering it in an inoculated, safe format to the end user’s Web browser.
-
Absolute Professional Services
- Absolute Assist for Access & Endpoint – Annual service to provide technical account management, consulting on expanding usage of product capabilities and ensuring customers are getting maximum value from their product investment with Absolute.
- Absolute Manage for Access & Endpoint – Annual service to assist in the operational administration of the customer’s product deployment.
- Absolute Onboarding for Access & Endpoint – One-time project to get a new customer’s product purchase deployed.
- Absolute Consulting for Access & Endpoint – One-time projects to assist in upgrades, new use cases or integrations.
- Absolute Customization for Endpoint – One-time project to implement a custom automation.
- Deployment Healthcheck for Access & Endpoint – One-time project to review the deployment configuration and offer optimizations to improve the effectiveness of the implementation.
- Product Administrator Class for Access & Endpoint – Hands on class to teach product admins how to use the product capabilities.
- Endpoint Resilience Assessment – Detailed assessment of how resilient an organization is if their endpoint devices became incapacitated and they need to execute their recovery plan.