Absolute Security unveils Rehydrate to quickly restore inoperable devices

Enterprise cyber resilience player Absolute Security has announced the general availability of Rehydrate. Enterprises with business operations that have been stopped by Windows PCs made inoperable by cyberattacks, ransomware strikes, and IT incidents can use this industry-first innovation to automate the at-scale restoration of connected devices to a fully operational state. Typically it takes 30 minutes or less, and is done remotely and with a single click.

“Ransomware attacks, security breaches, and software failures are now a routine part of doing business,” said John Herrema, Chief Product Officer, Absolute Security.  “Resilient organizations are prepared for this new reality and have built in the ability to rapidly recover and maintain operations without missing a beat when inevitable disruptions occur.”

In this context, Rehydrate is highly useful.

“With Rehydrate, we’re helping to make this possible by enabling companies to restore compromised endpoints within minutes, stopping downtime and eliminating costs that traditionally follow cyber incidents,” Herrema stated.

“Absolute Rehydrate empowers enterprises to recover from IT or cyber incidents remotely and at-scale to minimize operational downtime,” Herrera added. “IT and security teams can run playbooks to restore compromised endpoints back to fully trusted and compliant state.”

In January 2025, Herrema shared how they are expanding and further unifying the Absolute Resilience Platform to address critical challenges and opportunities. At that time, Absolute Rehydrate was available as a tech preview, a capability purpose-built to address the costly challenge of operational downtime.”

“Today, I am proud to introduce the availability of Absolute Rehydrate — the solution to recover devices automatically at scale in minutes, not days, to stop downtime before it disrupts your business,” Herrema said.

Rehydrate is powered by the Absolute Resilience platform, embedded in the firmware of more than 600 million Windows PCs through OEM partnerships with more than 28 of the world’s leading device manufacturers. This nearly ubiquitous availability makes it easy for customers to quickly deploy the platform across their Windows 10 and Windows 11 device fleets and activate Rehydrate to enable the immediate restoration of compromised devices at scale. Absolute Security’s unique position in the firmware allows Rehydrate to restore affected devices even when the device OS and other security or management tools have crashed, been compromised, become corrupted, or made inaccessible due to a ransomware infection.

Now generally available in the Absolute Secure Endpoint solution, Rehydrate delivers near instant business continuity endpoint restoration through a fully remote, single-click process. When your remote, mobile, and hybrid Windows PCs go down, recovery playbooks ranging from targeted remediations to full OS recovery can be executed across connected devices at enterprise scale.

“Beyond restoring a full golden image, you can deploy surgical playbooks to perform specific actions,” Herrema said. “This includes deleting malicious files, repairing registry keys, or executing custom scripts to restore and harden a device after an incident. You can execute these precise actions at scale across your entire fleet, whether devices are connected via wired or wireless networks.”

After your organization has recovered from a disruption to its business, Rehydrate will automate the reinstallation of critical security controls, in minutes, helping to ensure that valuable and sensitive on-premises, cloud, and device data is defended against threats and protected against risk.

“Absolute Rehydrate includes new parameterized playbooks and API support,” Herrema indicated. “This allows you to integrate Rehydrate into your existing security ecosystem and automate complex recovery workflows. Instead of just reacting, you can build a system that automatically responds to threats and strengthens your defenses in real time.”

Full integration into the Absolute Resilience platform and Secure Endpoint product lines, including Absolute Secure Endpoint Resilience, Resilience for Automation, and Resilience for Security editions, enables fast and easy deployment, direct from the Absolute Security management console.

“By analyzing the incident and using Rehydrate to apply targeted fixes and remediations at the time of recovery, and Resilience for Automation to ensure they remain continuously in place post-recovery, you continuously improve your organization’s resilience,” Herrema commented. “You are not just resetting a device; you are reinforcing it against future attacks.”

Strengthened device authentication, aligned with modern security standards, further secures the recovery process through integrated support for the Trusted Platform Module (TPM).

“Cybercrime and software failures cause disruptions that cost organizations more than a trillion dollars in losses annually,” said Jarad Carleton, Global Market Research Director for Cybersecurity, Frost & Sullivan. “CISOs are increasingly being called on to help ensure their organizations can achieve the level of resilience needed to quickly restore their operations before downtime creates a financial catastrophe. Forward-thinking leaders are adopting solutions and strategies that prioritize operational continuity into every layer of their digital infrastructure — from the endpoint to the cloud.”