-

Absolute Security Unveils GenAI Assistant and Automation Innovations to Spot and Remediate Endpoint Risk in Near Real Time

  • CISOs Can Now Quickly Restore Continuity and Maintain Operational Resilience in the Face of Advanced Threats and Complexity
  • Visit Absolute Security at Black Hat 2025, Booth 4605 to Discover More and to Receive a Demo

SEATTLE & LAS VEGAS--(BUSINESS WIRE)--Absolute Security, a leader in enterprise cyber resilience, today announced new innovations available on the Absolute Resilience Platform. An advanced GenAI assistant enables natural-language queries that instantly answer vital questions about the security and compliance status of endpoint devices. Enhanced application control helps ensure critical endpoint and network security defenses are present across every device and operating with maximum effectiveness and efficiency. Customizable dashboards deliver enhanced insights that support your organization’s unique IT and security environment. Built on a foundation of AI-powered resilience, these innovative features enable smarter and faster decision making—helping CISOs and security teams to speed remediation for issues negatively impacting endpoint performance, compliance, and security.

“Organizations need to know they can recover quickly when disruption hits—whether it’s a cyberattack, data breach, or a software breakdown,” said John Herrema, Chief Product Officer, Absolute Security. “By expanding our capabilities with generative AI and automation across our product lines, we’re giving CISOs the speed, agility, and clarity needed to know where the problems are, respond faster, reduce risk, and to keep their businesses running.”

Introduced as part of the Absolute Secure Endpoint 10 release, the innovations provide essential security and compliance advantages and benefits:

  • Gain immediate answers about the security, compliance, and performance status of your environment to accelerate remediation for issues negatively impacting your endpoint fleet. With the Absolute AI Assistant, security teams can use natural language queries to accelerate access to vital information, eliminating manual processes and maximizing efficiency.
  • Take full control of your security and IT environment with the ability to visualize essential information in ways that align with your unique processes, workflows, and remediation procedures. Security and IT teams using Absolute Customizable Dashboards can gather and consolidate scattered data in a single view, making it easier to spot anomalies, streamline operations, and make confident, data-backed decisions.
  • Maintain operational resilience for your most important security and risk controls deployed across every endpoint to ensure your organization remains defended and protected against threats, risk, and complexity. With Absolute Required Applications, security teams can ensure that critical business applications, security controls, and management tools are consistently deployed to maximize productivity, security, compliance, and software ROI.

To learn more about the new capabilities, read the blog: Introducing the Absolute Secure Endpoint 10 Release

Want to learn about the best kept secret in Cybersecurity today? Visit Absolute Security at Black Hat 2025, Booth 4605, Mandalay Bay Convention Center, Las Vegas. Schedule a demo or meeting in advance with our cyber resilience experts: Schedule Today

About Absolute Security

Absolute Security is partnered with more than 28 of the world’s leading endpoint device manufacturers, embedded in the firmware of 600 million devices, trusted by thousands of global enterprise customers, and licensed across 16 million PC users. With the Absolute Security Cyber Resilience Platform integrated into their digital enterprise, customers ensure their mobile and hybrid workforces connect securely and seamlessly from anywhere in the world and that business operations recover quickly following cyber disruptions and attacks. To learn more, visit www.absolute.com and follow us on LinkedIn, X, and YouTube.

ABSOLUTE SECURITY, ABSOLUTE, the ABSOLUTE LOGO, AND NETMOTION are registered trademarks of Absolute Software Corporation ©2025, or its subsidiaries. All Rights Reserved. Other names or logos mentioned herein may be the trademarks of Absolute or their respective owners. The absence of the symbols ™ and ® in proximity to each trademark, or at all, herein is not a disclaimer of ownership of the related trademark.

Contacts

For more information, please contact:

News Media Relations
Joe Franscella
press@absolute.com

Absolute Security


Release Versions

Contacts

For more information, please contact:

News Media Relations
Joe Franscella
press@absolute.com

Social Media Profiles
More News From Absolute Security

Absolute Security and CrowdStrike Expand Partnership to Deliver Resilience to CrowdStrike Customers

SEATTLE & LAS VEGAS--(BUSINESS WIRE)--Absolute Security, a leader in enterprise cyber resilience, today announced that Absolute Resilience™ is now available for purchase in the CrowdStrike Marketplace, the one-stop destination for CrowdStrike’s world-class ecosystem of compatible security products. With Absolute Security, organizations can further strengthen their cyber resilience by ensuring that mission-critical applications maintain continuous visibility, self-healing capabilities, and opera...

New Absolute Security Research Shows Top Endpoint Security Controls Fail 22% of the Time

SEATTLE--(BUSINESS WIRE)--Absolute Security Research Shows Top Endpoint Security Controls Fail 22% of the Time. AI is Exploding; PCs Log Thousands of DeepSeek Visits....

Absolute Security Introduces Extreme Resilience

SEATTLE & LAS VEGAS--(BUSINESS WIRE)--(Dell Technologies World 2025) – Absolute Security, a leader in enterprise resilience, today announced new Extreme Resilience capabilities available in Rehydrate, an Absolute Resilience Platform module. Rehydrate enables remote restoration of Windows endpoints at enterprise scale with a single click. It delivers full recovery even when the device OS and other security or management tools have crashed, been compromised, or become corrupted. With these new Ex...
Back to Newsroom