The absolute platform consists of three core components.
Absolutely durable technology
AbsolutePersistence® Technology, a unique and patented technology, has already been incorporated into more than 600 million devices as a result of Absolute's partnership with nearly 30 system manufacturers around the world. Once activated, the technology is intensely resilient and is the only solution that can withstand attempts to disable it, whether the device is reimagined, the hard drive has been replaced, or the firmware has been updated.
No other technology can do this. Ultimately, you'll gain unprecedented real-time visibility, control, and repair capabilities, providing a secure, unbreakable, and always-on-existing connection between your absolute platform and your endpoint.
Absolute resilience technology
The Absolute Platform leverages two patented Absolute Resilience™ technologies to ensure mission-critical applications remain healthy and operational, providing the most productive and optimized remote access experience for end users.
Application Resilience™: Monitor the health and behavior of mission-critical applications. Detects if missing, corrupted or not running. Automatically repair or reinstall components as needed – without the need for human intervention. Application resilience ensures that security controls are working as expected, and by fixing unhealthy applications, you can provide the optimal user experience. Currently, over 60 mission-critical applications are enabled for application resilience and are being added frequently. Network Resilience™: To automatically restore and optimize unhealthy network connections with monitors and unhealthy network connections, networked applications will continue to operate without interruptions affecting end users who otherwise require manual application restart, network reconnection, and/or re-awareness. Network resilience allows for greater connectivity and reliability, allowing end users to focus on tasks rather than network behavior.
Absolute guarantees digital tethering to each device intact, providing reliable insight and intelligence from every endpoint to the network edge.
Hundreds of data points are collected and act as insights, providing guidance on usage, health, security and compliance attitudes, and providing a unified view of the entire end-user experience. Applying AI-based risk assessments and user entities' behavioral analysis allows automated remediation and uncompromising user productivity beyond resource and application monitoring.