Secure Endpoint

Absolute Insights for Endpoints Add-On

Identify and respond to anomalies through customizable historical dashboards


Gain real-time asset and security insights

IT and security practitioners have to manage an increasingly remote endpoint fleet. To secure and manage devices, these teams need historical trend data to understand device, user, and application behavior. The Absolute Insights™ for Endpoints add-on module provides these valuable capabilities.

Highlights

Analyze historical device and security trends across your entire device population

Leverage a growing library of pre-built or custom dashboards based on your organization’s policies

Customize dashboard timelines to drill-down by month, week, day, or hour for detailed information

Create data correlation from raw data points to identify abnormalities in device and security metrics

Create custom visualizations through tables, pie charts, and line graphs

Run queries across your device and security datapoints to search for and investigate anomalies

Gain IT and security insights across your endpoints

Leverage custom and pre-built dashboards

  • Access real-time insights into a variety of historical endpoint metrics, including OS patch health, software updates, user behavior patterns, sensitive data exposure, application health and usage, etc.

  • Choose from a growing library of pre-built dashboards or create custom ones aligned with your organization’s business and compliance requirements.

Create custom visualizations

Search, investigate, and hunt

  • Build custom dashboards based on certain timelines (i.e., month, week, day, or hour), visualization type (i.e., table, pie, bar, line chart, etc.) and targeted filters (i.e., devices, apps, users, etc.) to gather detailed insights.

  • Create data aggregations from raw data points and run custom queries to search, investigate, and hunt for abnormalities across device and security metrics.

Absolute Insights for Endpoints is available as an add-on module and requires and existing Absolute Visibility, Control, or Resilience subscription.

What our customers love about Absolute

"Since using Absolute, we have greater visibility across our endpoints than in the past. Insights for Endpoints allows us to go even deeper for analytics of the device and our users, thus helping us make better corporate decisions and protect IT investment."

Ivan Ramon Castillo Morales,Coordination of Tools for User Support

Banco Bilbao Vizcaya Argentaria (or BBVA)

Insights for Endpoints FAQ

Absolute Insights for Endpoints offers IT administrators and security practitioners historical device and security trends across their endpoint environments in order to manage endpoints, maintain end user experience, and adhere with internal policies or compliance requirements for the work from anywhere environment. The product enables IT and security practitioners to build custom dashboards according to their organization’s business or compliance needs, perform data aggregations, and run queries to identify and respond to anomalies.

Absolute Insights for Endpoints is available for purchase as an add-on module. It requires an existing subscription to either the Absolute Visibility, Control, or Resilience service tier.

Absolute Insights for Endpoints is available in three distinct SKU offerings with 30-, 60-, and 90-day data storage increments. The higher data storage options are recommended for those customers requiring greater device data point retention due to the variety of IT and security use cases they want to cover/investigate.

Absolute Insights for Endpoints caters to a variety of IT and security use cases, enabling practitioners to manage devices, maintain end user experience and comply with internal policies or regulatory frameworks. Examples include tracking software rollouts and usage, proactively identifying hardware issues such as battery health or memory usage, monitoring OS patch and version status, ensuring the health of core applications such as anti-malware and VPN, and identifying vulnerable devices based on geolocation and sensitive data storage, or other risk factors.

Absolute Insights requires an existing subscription to either the Absolute Visibility, Control, or Resilience service tier. In addition, obtaining insights into various IT and security trends is dependent on the activation of the following policies through the Absolute Console. Note that the availability of these policies may differ based on service tier.

  • Hardware: captures a variety of asset inventory details across devices
  • Endpoint Data Discovery: identifies files stored on devices having sensitive data (e.g., financial details, personally identifiable information, intellectual property)
  • Full-Disk Encryption Status: captures full-disk encryption health status across devices
  • Device Usage: captures device usage metrics based on device interaction events
  • Application Health: monitors the health of mission-critical applications such as anti-malware, encryption, and VPN
  • Geolocation Tracking: captures geolocation details based on Wi-Fi triangulation, GPS location, and IP address.
  • Installed Applications: captures information about installed applications, including versions, publisher, and app usage details
  • Web Usage: identifies Web content that is most visited by users to optimize Web application licenses and identify risks associated with unsecure or unauthorized content
  • Custom Data: captures custom datapoints defined by customers using the Absolute DataExplorer tool

Customers can customize dashboards by choosing from a number of visualization types (e.g., table, pie, bar, line chart, etc.), modifying the applicable time period (e.g., month, week, day, or hour), and adding targeted filters (e.g., devices, apps, users, etc.) to gather insights based on specific needs.

Examples of scenarios where leveraging filters to acquire specific device or security related information might be helpful, includes the following:

  • Identify devices in Victoria, B.C. that were unencrypted between Jan 15 to Feb 15, 2022
  • View versions of a specific app installed across device population (e.g., Firefox)
  • Remove pre-built Windows apps (Photos) from appearing on “Applications Installed” visualization
  • View IT and security insights for devices in Los Angeles only

Customers can indeed aggregate multiple datasets through targeted commands such as sum, count, mean, median, top values, etc. to identify anomalies and potential device or security risks to ensure they don’t develop into more serious events.

Take action and learn more

Like what you're hearing?

We’d love to show you how Absolute can secure and empower your organization.

Financial Services