-

Absolute Security Rehydrate Remotely Restores Compromised Endpoints at Scale in Minutes, Stopping Downtime Caused by Cyberattacks, Ransomware, and Software Incidents

Powered by the Absolute Resilience Platform, Embedded in the Firmware of more than 600 Million Windows PCs, this Industry-First Innovation Enables Organizations to Perform Remote, Single-Click Restoration for any Connected Windows PC

SEATTLE & LAS VEGAS--(BUSINESS WIRE)--(Fal.Con 2025)Absolute Security, a leader in enterprise cyber resilience, today announced general availability of Rehydrate. Enterprises with business operations that have been stopped by Windows PCs made inoperable by cyberattacks, ransomware strikes, and IT incidents can use this industry-first innovation to automate the at-scale restoration of connected devices to a fully operational state, typically in 30 minutes or lessremotely and with a single click.

"Ransomware attacks, security breaches, and software failures are now a routine part of doing business. Resilient organizations are prepared for this new reality and have built-in the ability to rapidly recover and maintain operations without missing a beat when inevitable disruptions occur,” said John Herrema, Chief Product Officer, Absolute Security. “With Rehydrate, we're helping to make this possible by enabling companies to restore compromised endpoints within minutes, stopping downtime and eliminating costs that traditionally follow cyber incidents."

Rehydrate is powered by the Absolute Resilience platform, embedded in the firmware of more than 600 million Windows PCs through OEM partnerships with more than 28 of the world’s leading device manufacturers. This nearly ubiquitous availability makes it easy for customers to quickly deploy the platform across their Windows 10 and Windows 11 device fleets and activate Rehydrate to enable the immediate restoration of compromised devices at scale. Absolute Security’s unique position in the firmware allows Rehydrate to restore affected devices even when the device OS and other security or management tools have crashed, been compromised, become corrupted, or made inaccessible due to a ransomware infection.

Now generally available in the Absolute Secure Endpoint solution, Rehydrate delivers:

  • Near instant business continuity endpoint restoration through a fully remote, single-click process. When your remote, mobile, and hybrid Windows PCs go down, recovery playbooks ranging from targeted remediations to full OS recovery can be executed across connected devices at enterprise scale.
  • Fast return to a secure and compliant state across device fleets. After your organization has recovered from a disruption to its business, Rehydrate will automate the reinstallation of critical security controls, in minutes, helping to ensure that valuable and sensitive on-premises, cloud, and device data is defended against threats and protected against risk.
  • Seamless delivery, giving stretched IT and security teams a solution that recovers endpoints remotely, rapidly, and at mass-scale to stop downtime. Full integration into the Absolute Resilience platform and Secure Endpoint product lines, including Absolute Secure Endpoint Resilience, Resilience for Automation, and Resilience for Security editions enables fast and easy deployment, direct from the Absolute Security management console.
  • WiFi and Ethernet support capabilities, making it easy for remote, hybrid, and mobile employees to connect their compromised devices for rapid restoration—eliminating the need to return devices to IT and security locations for repair.
  • Strengthened device authentication, aligned with modern security standards, further secures the recovery process through integrated support for the Trusted Platform Module (TPM).

"In the event of ransomware, malware, or system crashes, Absolute Rehydrate enables our company to quickly return devices to a trusted state. This rapid recovery mechanism is crucial for maintaining business continuity and minimizing the impact of cyber incidents. It also supports proactive disaster recovery planning, ensuring that endpoint restoration is not dependent on a functioning OS or network tools," said a Global Enterprise Technology Industry Customer

“Cybercrime and software failures cause disruptions that cost organizations more than a trillion dollars in losses annually,” said Jarad Carleton, Global Market Research Director for Cybersecurity, Frost & Sullivan. “CISOs are increasingly being called on to help ensure their organizations can achieve the level of resilience needed to quickly restore their operations before downtime creates a financial catastrophe. Forward-thinking leaders are adopting solutions and strategies that prioritize operational continuity into every layer of their digital infrastructure—from the endpoint to the cloud.”

Visit Absolute Security at Fal.Con 2025, Las Vegas, Booth 2108, MGM Grand, for a Rehydrate Demo and to Learn More about how we Stop Downtime. Discover more and schedule a meeting in advance to receive a complementary gift.

For more details on Rehydrate, read the blog: Beyond Endpoint Recovery: Absolute Rehydrate and the New Era of Anti-Fragility

About Absolute Security

Absolute Security is partnered with more than 28 of the world’s leading endpoint device manufacturers, embedded in the firmware of 600 million devices, trusted by thousands of global enterprise customers, and licensed across 16 million PC users. With the Absolute Security Cyber Resilience Platform integrated into their digital enterprise, customers ensure their mobile and hybrid workforces connect securely and seamlessly from anywhere in the world and that business operations recover quickly following cyber disruptions and attacks. To learn more, visit www.absolute.com and follow us on LinkedIn, X, Facebook, and YouTube.

ABSOLUTE SECURITY, ABSOLUTE, the ABSOLUTE LOGO, AND NETMOTION are registered trademarks of Absolute Software Corporation ©2025, or its subsidiaries. All Rights Reserved. Other names or logos mentioned herein may be the trademarks of Absolute or their respective owners. The absence of the symbols ™ and ® in proximity to each trademark, or at all, herein is not a disclaimer of ownership of the related trademark.

Contacts

Media Contact:
Joe Franscella
press@absolute.com

Absolute Security


Release Versions

Contacts

Media Contact:
Joe Franscella
press@absolute.com

Social Media Profiles
More News From Absolute Security

News Media Alert: Absolute Security Congratulates Inaugural Resilient CISO Award and Trailblazer Award Honorees

SEATTLE & SAN FRANCISO--(BUSINESS WIRE)--(RSAC) Absolute Security, an enterprise cyber resilience leader, today announced the first honorees for the inaugural Resilient CISO Award and winners of the Trailblazer Awards. The Resilient CISO Award was sponsored in partnership with CyberRisk Alliance/SC Media. The Trailblazer Awards are a category created by a special panel of industry security and risk leaders. Honorees, winners, and finalists were announced at special events during RSAC 2026. Both...

NEWS MEDIA ADVISORY: Ray Kurzweil Keynotes Absolute Security Resilient CISO Summit During RSAC 2026

SEATTLE & SAN FRANCISCO--(BUSINESS WIRE)--(RSAC) — Absolute Security, an enterprise cyber resilience leader, today announced renowned futurist, inventor, author, and AI thought leader Ray Kurzweil will headline the Resilient CISO Summit. During his keynote, Cybersecurity in the Age of Exponential Intelligence, Kurzweil will provide groundbreaking insights into the future of AI and its critical impact on cybersecurity leadership. As part of the program, Absolute Security President & CEO Chri...

NEWS MEDIA ADVISORY: Absolute Security New Cyber Resilience Offering Protects Enterprise PC Fleets Against Downtime, with No Upfront Cost

SEATTLE & SAN FRANCISCO--(BUSINESS WIRE)--(RSAC) — Absolute Security, an enterprise cyber resilience leader, today announced availability of Rehydrate Ready. Available with no upfront investment required, it is the industry’s only firmware-embedded innovation that can prepare organizations to automate the at-scale restoration of endpoint devices to a fully operational state following cyber incidents and disruptions—with a single click, in 30 minutes or less. Absolute Security is embedded in the...
Back to Newsroom