Absolute announced new platform capabilities enabling IT and Security teams to automatically generate and distribute scheduled reports to ensure compliance across the enterprise; easily monitor, manage, and secure missing endpoint devices at scale; and understand if critical endpoint controls are healthy and working effectively. As the world continues to face uncertainty around how and where employees will work and how and where students will learn, Absolute is augmenting IT and Security teams with solutions to strengthen their security posture and improve endpoint compliance. Leveraging its patented Persistence® technology and unique firmware-embedded position, Absolute enables an undeletable digital tether capable of delivering complete visibility and control over all devices and providing the single-source-of-truth endpoint intelligence needed to automate tedious reporting processes and help ensure complex compliance requirements are being met. Additional enterprise capabilities recently added to the Absolute platform include: The ability to Instantly monitor any number of missing devices: A single-step, one-click upload enables IT to flag any number of devices as missing, as well as generate real-time email alerts and take immediate action if any of those devices connect to the internet. The ability to track and fine-tune the execution of custom workflows and remedial actions: Absolute's new Action History allows IT and Security professionals to track the status of query and remediation scripts across large groups of devices from a single monitoring center - allowing them to confirm the successful execution of a script or a device wipe request, and fine-tune, relaunch or cancel remedial actions if needed. Absolute also continues to expand its library of autonomous, self-healing applications powered by Absolute's Application PersistenceTM service, adding support for updated versions of VMware Carbon Black CloudTM and McAfee® ePolicy Orchestrator®. Absolute customers can proactively monitor the health of more than 40 of the world's leading endpoint controls, ensuring they remain healthy, undeletable, and able to self-heal if they are detected to be failing, missing, or tampered with.