About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Absolute Security Rehydrate Remotely Restores Compromised Endpoints at Scale in Minutes, Stopping Downtime Caused by Cyberattacks, Ransomware, and Software Incidents

Powered by the Absolute Resilience Platform, Embedded in the Firmware of more than 600 Million Windows PCs, this Industry-First Innovation Enables Organizations to Perform Remote, Single-Click Restoration for any Connected Windows PC

(Fal.Con 2025)Absolute Security, a leader in enterprise cyber resilience, today announced general availability of Rehydrate. Enterprises with business operations that have been stopped by Windows PCs made inoperable by cyberattacks, ransomware strikes, and IT incidents can use this industry-first innovation to automate the at-scale restoration of connected devices to a fully operational state, typically in 30 minutes or lessremotely and with a single click.

"Ransomware attacks, security breaches, and software failures are now a routine part of doing business. Resilient organizations are prepared for this new reality and have built-in the ability to rapidly recover and maintain operations without missing a beat when inevitable disruptions occur,” said John Herrema, Chief Product Officer, Absolute Security. “With Rehydrate, we're helping to make this possible by enabling companies to restore compromised endpoints within minutes, stopping downtime and eliminating costs that traditionally follow cyber incidents."

Rehydrate is powered by the Absolute Resilience platform, embedded in the firmware of more than 600 million Windows PCs through OEM partnerships with more than 28 of the world’s leading device manufacturers. This nearly ubiquitous availability makes it easy for customers to quickly deploy the platform across their Windows 10 and Windows 11 device fleets and activate Rehydrate to enable the immediate restoration of compromised devices at scale. Absolute Security’s unique position in the firmware allows Rehydrate to restore affected devices even when the device OS and other security or management tools have crashed, been compromised, become corrupted, or made inaccessible due to a ransomware infection.

Now generally available in the Absolute Secure Endpoint solution, Rehydrate delivers:

  • Near instant business continuity endpoint restoration through a fully remote, single-click process. When your remote, mobile, and hybrid Windows PCs go down, recovery playbooks ranging from targeted remediations to full OS recovery can be executed across connected devices at enterprise scale.
  • Fast return to a secure and compliant state across device fleets. After your organization has recovered from a disruption to its business, Rehydrate will automate the reinstallation of critical security controls, in minutes, helping to ensure that valuable and sensitive on-premises, cloud, and device data is defended against threats and protected against risk.
  • Seamless delivery, giving stretched IT and security teams a solution that recovers endpoints remotely, rapidly, and at mass-scale to stop downtime. Full integration into the Absolute Resilience platform and Secure Endpoint product lines, including Absolute Secure Endpoint Resilience, Resilience for Automation, and Resilience for Security editions enables fast and easy deployment, direct from the Absolute Security management console.
  • WiFi and Ethernet support capabilities, making it easy for remote, hybrid, and mobile employees to connect their compromised devices for rapid restoration—eliminating the need to return devices to IT and security locations for repair.
  • Strengthened device authentication, aligned with modern security standards, further secures the recovery process through integrated support for the Trusted Platform Module (TPM).

"In the event of ransomware, malware, or system crashes, Absolute Rehydrate enables our company to quickly return devices to a trusted state. This rapid recovery mechanism is crucial for maintaining business continuity and minimizing the impact of cyber incidents. It also supports proactive disaster recovery planning, ensuring that endpoint restoration is not dependent on a functioning OS or network tools," said a Global Enterprise Technology Industry Customer

“Cybercrime and software failures cause disruptions that cost organizations more than a trillion dollars in losses annually,” said Jarad Carleton, Global Market Research Director for Cybersecurity, Frost & Sullivan. “CISOs are increasingly being called on to help ensure their organizations can achieve the level of resilience needed to quickly restore their operations before downtime creates a financial catastrophe. Forward-thinking leaders are adopting solutions and strategies that prioritize operational continuity into every layer of their digital infrastructure—from the endpoint to the cloud.”

Visit Absolute Security at Fal.Con 2025, Las Vegas, Booth 2108, MGM Grand, for a Rehydrate Demo and to Learn More about how we Stop Downtime. Discover more and schedule a meeting in advance to receive a complementary gift.

For more details on Rehydrate, read the blog: Beyond Endpoint Recovery: Absolute Rehydrate and the New Era of Anti-Fragility

About Absolute Security

Absolute Security is partnered with more than 28 of the world’s leading endpoint device manufacturers, embedded in the firmware of 600 million devices, trusted by thousands of global enterprise customers, and licensed across 16 million PC users. With the Absolute Security Cyber Resilience Platform integrated into their digital enterprise, customers ensure their mobile and hybrid workforces connect securely and seamlessly from anywhere in the world and that business operations recover quickly following cyber disruptions and attacks. To learn more, visit www.absolute.com and follow us on LinkedIn, X, Facebook, and YouTube.

ABSOLUTE SECURITY, ABSOLUTE, the ABSOLUTE LOGO, AND NETMOTION are registered trademarks of Absolute Software Corporation ©2025, or its subsidiaries. All Rights Reserved. Other names or logos mentioned herein may be the trademarks of Absolute or their respective owners. The absence of the symbols ™ and ® in proximity to each trademark, or at all, herein is not a disclaimer of ownership of the related trademark.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.