Contact company Download PDF version
Summary is AI-generated, newsdesk-reviewed
  • Absolute Security launches Rehydrate for quick, remote recovery of compromised Windows PCs.
  • Rehydrate ensures rapid restoration, supporting 600 million PCs through OEM partnerships.
  • New tech automates endpoint recovery, bolstering business continuity and device data protection.

Absolute Security, a pioneer in enterprise cyber resilience, has launched its Rehydrate technology on general availability.

Enterprises with business operations that have been stopped by Windows PCs made inoperable by cyberattacks, ransomware strikes, and IT incidents to automate the at-scale restoration of connected devices to a fully operational state, typically in 30 minutes or less—remotely and with a single click. 

Rapidly recover and maintain operations

"Ransomware attacks, security breaches, and software failures are now a routine part of doing business. Resilient organisations are prepared for this new reality and have built-in the ability to rapidly recover and maintain operations without missing a beat when inevitable disruptions occur,” said John Herrema, Chief Product Officer, Absolute Security.

With Rehydrate, we're helping to make this possible by enabling companies to restore compromised endpoints within minutes, stopping downtime and eliminating costs that traditionally follow cyber incidents." 

Windows PCs through OEM partnerships

Rehydrate is powered by the Absolute Resilience platform, embedded in the firmware

Rehydrate is powered by the Absolute Resilience platform, embedded in the firmware of more than 600 million Windows PCs through OEM partnerships with more than 28 of the world’s pioneering device manufacturers.

This nearly ubiquitous availability makes it easy for customers to quickly deploy the platform across their Windows 10 and Windows 11 device fleets and activate Rehydrate to enable the immediate restoration of compromised devices at scale.

Device OS and other security or management tools

Absolute Security’s unique position in the firmware allows Rehydrate to restore affected devices even when the device OS and other security or management tools have crashed, been compromised, become corrupted, or made inaccessible due to a ransomware infection. 

Now generally available in the Absolute Secure Endpoint solution, Rehydrate delivers: Near instant business continuity endpoint restoration through a fully remote, single-click process. When the remote, mobile, and hybrid Windows PCs go down, recovery playbooks ranging from targeted remediations to full OS recovery can be executed across connected devices at enterprise scale.

Absolute Resilience platform and Secure Endpoint product lines

Seamless delivery, giving stretched IT and security teams a key that heals endpoints remotely

Fast return to a secure and compliant state across device fleets. After the organisation has recovered from a disruption to its business, Rehydrate will automate the reinstallation of critical security controls, in minutes, helping to ensure that valuable and sensitive on-premises, cloud, and device data is defended against threats and protected against risk.

Seamless delivery, giving stretched IT and security teams a solution that recovers endpoints remotely, rapidly, and at mass-scale to stop downtime.

Full integration into the Absolute Resilience platform and Secure Endpoint product lines, including Absolute Secure Endpoint Resilience, Resilience for Automation, and Resilience for Security editions enables fast and easy deployment, direct from the Absolute Security management console.

Modern security standards

WiFi and Ethernet support abilities, making it easy for remote, hybrid, and mobile employees to connect

WiFi and Ethernet support capabilities, making it easy for remote, hybrid, and mobile employees to connect their compromised devices for rapid restoration—eliminating the need to return devices to IT and security locations for repair.

Strengthened device authentication, aligned with modern security standards, further secures the recovery process through integrated support for the Trusted Platform Module (TPM).

Adopting solutions and strategies

Cybercrime and software failures cause disruptions that cost organisations more than a trillion dollars in losses annually,” said Jarad Carleton, Global Market Research Director for Cybersecurity, Frost & Sullivan.

CISOs are increasingly being called on to help ensure their organisations can achieve the level of resilience needed to quickly restore their operations before downtime creates a financial catastrophe. Forward-thinking pioneers are adopting solutions and strategies that prioritise operational continuity into every layer of their digital infrastructure—from the endpoint to the cloud.” 

In case you missed it

How can physical security systems make schools safer?
How can physical security systems make schools safer?

Students deserve a safe and positive environment where they can learn and thrive. Teachers and administrators should be able to focus on their primary role of educating students be...

DNAKE smart intercom elevates Dickensa 27 security
DNAKE smart intercom elevates Dickensa 27 security

Dickensa 27, a modern residential complex in Warsaw, Poland, sought to enhance its security, communication, and convenience for residents through advanced intercom solutions. ...

Anviz transforms traditional property management into a smart reality, making digitisation more than just talk
Anviz transforms traditional property management into a smart reality, making digitisation more than just talk

The Middle East has recently expanded its real estate market as the region's economy grows and urbanisation accelerates. This trend has led to an increasing demand for smart securi...

Quick poll
How likely is it that companies will invest in cloud-based physical security solutions in the next 5 years?