Summary is AI-generated, newsdesk-reviewed
  • Absolute Security launches Rehydrate for quick, remote recovery of compromised Windows PCs.
  • Rehydrate ensures rapid restoration, supporting 600 million PCs through OEM partnerships.
  • New tech automates endpoint recovery, bolstering business continuity and device data protection.

Absolute Security, a pioneer in enterprise cyber resilience, has launched its Rehydrate technology on general availability.

Enterprises with business operations that have been stopped by Windows PCs made inoperable by cyberattacks, ransomware strikes, and IT incidents to automate the at-scale restoration of connected devices to a fully operational state, typically in 30 minutes or less—remotely and with a single click. 

Rapidly recover and maintain operations

"Ransomware attacks, security breaches, and software failures are now a routine part of doing business. Resilient organisations are prepared for this new reality and have built-in the ability to rapidly recover and maintain operations without missing a beat when inevitable disruptions occur,” said John Herrema, Chief Product Officer, Absolute Security.

With Rehydrate, we're helping to make this possible by enabling companies to restore compromised endpoints within minutes, stopping downtime and eliminating costs that traditionally follow cyber incidents." 

Windows PCs through OEM partnerships

Rehydrate is powered by the Absolute Resilience platform, embedded in the firmware

Rehydrate is powered by the Absolute Resilience platform, embedded in the firmware of more than 600 million Windows PCs through OEM partnerships with more than 28 of the world’s pioneering device manufacturers.

This nearly ubiquitous availability makes it easy for customers to quickly deploy the platform across their Windows 10 and Windows 11 device fleets and activate Rehydrate to enable the immediate restoration of compromised devices at scale.

Device OS and other security or management tools

Absolute Security’s unique position in the firmware allows Rehydrate to restore affected devices even when the device OS and other security or management tools have crashed, been compromised, become corrupted, or made inaccessible due to a ransomware infection. 

Now generally available in the Absolute Secure Endpoint solution, Rehydrate delivers: Near instant business continuity endpoint restoration through a fully remote, single-click process. When the remote, mobile, and hybrid Windows PCs go down, recovery playbooks ranging from targeted remediations to full OS recovery can be executed across connected devices at enterprise scale.

Absolute Resilience platform and Secure Endpoint product lines

Seamless delivery, giving stretched IT and security teams a key that heals endpoints remotely

Fast return to a secure and compliant state across device fleets. After the organisation has recovered from a disruption to its business, Rehydrate will automate the reinstallation of critical security controls, in minutes, helping to ensure that valuable and sensitive on-premises, cloud, and device data is defended against threats and protected against risk.

Seamless delivery, giving stretched IT and security teams a solution that recovers endpoints remotely, rapidly, and at mass-scale to stop downtime.

Full integration into the Absolute Resilience platform and Secure Endpoint product lines, including Absolute Secure Endpoint Resilience, Resilience for Automation, and Resilience for Security editions enables fast and easy deployment, direct from the Absolute Security management console.

Modern security standards

WiFi and Ethernet support abilities, making it easy for remote, hybrid, and mobile employees to connect

WiFi and Ethernet support capabilities, making it easy for remote, hybrid, and mobile employees to connect their compromised devices for rapid restoration—eliminating the need to return devices to IT and security locations for repair.

Strengthened device authentication, aligned with modern security standards, further secures the recovery process through integrated support for the Trusted Platform Module (TPM).

Adopting solutions and strategies

Cybercrime and software failures cause disruptions that cost organisations more than a trillion dollars in losses annually,” said Jarad Carleton, Global Market Research Director for Cybersecurity, Frost & Sullivan.

CISOs are increasingly being called on to help ensure their organisations can achieve the level of resilience needed to quickly restore their operations before downtime creates a financial catastrophe. Forward-thinking pioneers are adopting solutions and strategies that prioritise operational continuity into every layer of their digital infrastructure—from the endpoint to the cloud.” 

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...