{"id":33078,"date":"2026-05-19T12:39:56","date_gmt":"2026-05-19T12:39:56","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=33078"},"modified":"2026-05-19T12:39:56","modified_gmt":"2026-05-19T12:39:56","slug":"absolute-expands-firmware-embedded-security-platform","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/","title":{"rendered":"\u30a2\u30d6\u30bd\u30ea\u30e5\u30fc\u30c8\u3001\u30d5\u30a1\u30fc\u30e0\u30a6\u30a7\u30a2\u7d44\u307f\u8fbc\u307f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3092\u62e1\u5f35"},"content":{"rendered":"<p>Absolute Software, a leader in the field of enterprise cyber resilience, announced that it has integrated its Secure Endpoint and Secure Access (Security Service Edge: SSE) solutions on the Absolute Security Cyber \u200b\u200bResilience Platform. This integration enables integrated access control based on endpoint status and security operations that prioritize business continuity. Organizations&#8217; Chief Information Officers (CIOs) and Security Officers (CISOs) can ensure that all registered endpoint devices can access networks, cloud applications, and sensitive data in compliance with the organization&#8217;s security risk policies, while also enabling business continuity and rapid recovery in the event of an incident.<\/p>\n<p>For information on Secure Endpoint and Secure Access (Security Service Edge: SSE), which are planned to be integrated on the Absolute Cyber \u200b\u200bResilience Platform, please refer to the following.<\/p>\n<p><strong>Absolute Secure Endpoint<\/strong><\/p>\n<p>is a solution that provides resilient visibility, control, security, and rapid recovery for PCs distributed worldwide. Built into the firmware of over 600 million endpoints, the Absolute Resilience Platform ensures that the operating system (OS), applications, and critical security measures are always up-to-date, protecting against vulnerabilities and threats and guaranteeing flawless operation from the moment the device is powered on.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/akamai-expands-ai-security-with-layerx-acquisition\/\" rel=\"bookmark\">\u30a2\u30ab\u30de\u30a4\u3001LayerX \u306e\u8cb7\u53ce\u3067 AI \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u62e1\u5927<\/a><\/h4>\n<p><strong>Absolute Secure Access<\/strong><\/p>\n<p>is a ZTNA solution based on a zero-trust architecture that controls access while verifying the status of users and devices in real time. It provides secure and uninterrupted connectivity regardless of location in remote work and hybrid work environments.<\/p>\n<p><a href=\"https:\/\/www.absolute.com\/ja\">\u30a2\u30d6\u30bd\u30ea\u30e5\u30fc\u30c8\u30fb\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2<\/a> collaborates with over 28 of the world&#8217;s leading PC manufacturers and its solutions are embedded in the firmware of over 600 million devices. Supported by thousands of customers worldwide and adopted by 16 million PC users, Absolute Software&#8217;s cyber resilience platform enables digital businesses to ensure secure and uninterrupted connectivity from anywhere in the world during remote or hybrid work, and to quickly recover from cyberattacks and disruptions.<\/p>\n<p><strong>\u30bd\u30fc\u30b9 <a href=\"https:\/\/prtimes.jp\/main\/html\/rd\/p\/000000031.000098983.html\">PR\u30bf\u30a4\u30e0\u30ba<\/a><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Absolute Software, a leader in the field of enterprise cyber resilience, announced that it has integrated its Secure Endpoint and Secure Access (Security Service Edge: SSE) solutions on the Absolute Security Cyber \u200b\u200bResilience Platform. This integration enables integrated access control based on endpoint status and security operations that prioritize business continuity. Organizations&#8217; Chief Information Officers (CIOs) and Security Officers (CISOs) can ensure that all registered endpoint devices can access networks, cloud applications, and sensitive data in compliance with the organization&#8217;s security risk policies, while also enabling business continuity and rapid recovery in the event of an incident. For information on Secure Endpoint and Secure Access (Security Service Edge: SSE), which [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":33079,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,206,85],"tags":[5052,1680,1682,110,13020],"ppma_author":[205],"class_list":{"0":"post-33078","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-regional","12":"category-tech","13":"tag-absolute-software","14":"tag-cyber-resilience","15":"tag-cyberattack","16":"tag-cybersecurity","17":"tag-security-service-edge"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Absolute Advances Cyber Resilience With SSE<\/title>\n<meta name=\"description\" content=\"Absolute integrates endpoint security and SSE on its cyber resilience platform to improve secure access, compliance, and business continuity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Absolute Advances Cyber Resilience With SSE\" \/>\n<meta property=\"og:description\" content=\"Absolute integrates endpoint security and SSE on its cyber resilience platform to improve secure access, compliance, and business continuity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-19T12:39:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Absolute-Software-integrates-endpoint-security-and-security-service-edge.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"NewsDesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"NewsDesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Absolute Advances Cyber Resilience With SSE","description":"Absolute integrates endpoint security and SSE on its cyber resilience platform to improve secure access, compliance, and business continuity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/","og_locale":"ja_JP","og_type":"article","og_title":"Absolute Advances Cyber Resilience With SSE","og_description":"Absolute integrates endpoint security and SSE on its cyber resilience platform to improve secure access, compliance, and business continuity.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/","og_site_name":"itbusinesstoday","article_published_time":"2026-05-19T12:39:56+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Absolute-Software-integrates-endpoint-security-and-security-service-edge.webp","type":"image\/webp"}],"author":"NewsDesk","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"NewsDesk","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/"},"author":{"name":"NewsDesk","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/d58d81f55e8acd257ab63d49fb4ea812"},"headline":"Absolute Expands Firmware-Embedded Security Platform","datePublished":"2026-05-19T12:39:56+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/"},"wordCount":316,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Absolute-Software-integrates-endpoint-security-and-security-service-edge.webp","keywords":["Absolute Software","cyber resilience","cyberattack","cybersecurity","security service edge"],"articleSection":["APAC","Cybersecurity","Japan","News","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/","name":"Absolute Advances Cyber Resilience With SSE","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Absolute-Software-integrates-endpoint-security-and-security-service-edge.webp","datePublished":"2026-05-19T12:39:56+00:00","description":"Absolute integrates endpoint security and SSE on its cyber resilience platform to improve secure access, compliance, and business continuity.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Absolute-Software-integrates-endpoint-security-and-security-service-edge.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Absolute-Software-integrates-endpoint-security-and-security-service-edge.webp","width":1200,"height":800,"caption":"Absolute Software"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/absolute-expands-firmware-embedded-security-platform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"Absolute Expands Firmware-Embedded Security Platform"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/d58d81f55e8acd257ab63d49fb4ea812","name":"\u30cb\u30e5\u30fc\u30b9\u30c7\u30b9\u30af","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png74f313ad3d6fa27a1eee85c30be63d03","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","caption":"NewsDesk"},"sameAs":["https:\/\/itbusinesstoday.com"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/newsdesk\/"}]}},"authors":[{"term_id":205,"user_id":4,"is_guest":0,"slug":"newsdesk","display_name":"NewsDesk","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/33078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=33078"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/33078\/revisions"}],"predecessor-version":[{"id":33080,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/33078\/revisions\/33080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/33079"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=33078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=33078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=33078"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=33078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}