Absolute Security Practices
Trust starts with transparency
Tens of thousands of customers use Absolute’s self-healing, intelligent security solutions to help strengthen their cyber resilience against escalating cyber threats. Because so many organizations rely on Absolute, we have to ensure that our own software, systems, and operations are as secure as possible. Doing this starts with a culture of security; we build security into each and every activity we perform, right from the start.
Security Information
Security Processes
Absolute develops its software and deploys its systems using a set of security processes that allows us to build a safeguard in from the start and operate in a way that delivers consistent protection. These processes cover our Software Development Lifecycle, Operational Security, and our ongoing Testing.
Vulnerability Reporting and Management
While we take every security precaution, it’s a sad reality that even the most watertight systems occasional encounter bugs. When issues do arise, we act as quickly as possible to address them, inform our customers in a timely manner, and credit those who have helped us find these issues.
Known Vulnerabilities and Advisories
When vulnerabilities are brought to our attention, we fix them and notify customers. Once fixes are available, we release details of the vulnerabilities for the benefit of customers and researchers alike.
Certifications
It’s not good enough for us to believe that our systems are secure - we need to be able to prove it. As a result, we periodically have our systems audited and certified against industry standards such as ISO-27001.