Compare Absolute Secure Endpoint and Acronis Cyber Protect Cloud

At a Glance
Absolute Secure Endpoint
Absolute Secure Endpoint
Star Rating
(407)4.6 out of 5
Market Segments
Mid-Market (49.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Absolute Secure Endpoint
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Star Rating
(1,304)4.7 out of 5
Market Segments
Small-Business (69.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Acronis Cyber Protect Cloud excels in ease of use, with many users highlighting its intuitive interface and centralized management capabilities. This makes it a strong choice for businesses looking for a user-friendly solution that integrates well with tools like Microsoft 365 and SQL Server.
  • Users say that Absolute Secure Endpoint provides exceptional device protection, even maintaining security when key hardware components are replaced. This level of persistent protection is particularly valued by organizations with remote users, as it ensures comprehensive visibility over devices globally.
  • According to verified reviews, Acronis Cyber Protect Cloud has a significant advantage in implementation speed, with users noting that the setup process is straightforward and quick. This is a crucial factor for businesses that need to deploy solutions rapidly without extensive downtime.
  • Reviewers mention that while Absolute Secure Endpoint offers strong asset management features, its overall user satisfaction is lower compared to Acronis. Users appreciate the detailed visibility it provides, but some feel it lacks the broader functionality and integration options that Acronis offers.
  • Users highlight the quality of support from Acronis Cyber Protect Cloud, with many praising the responsiveness and expertise of their support team. This level of customer service can be a deciding factor for businesses that prioritize ongoing assistance and guidance.
  • G2 reviewers note that both products score similarly in meeting requirements, but Acronis Cyber Protect Cloud's higher overall satisfaction score suggests it may better align with user expectations and needs, particularly for small businesses looking for a comprehensive cyber protection solution.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Free Trial
Browse all 2 pricing plans
Free Trial
Absolute Secure Endpoint
No trial information available
Acronis Cyber Protect Cloud
Free Trial is available
Ratings
Meets Requirements
9.1
323
9.1
1,049
Ease of Use
8.7
326
9.1
1,068
Ease of Setup
8.8
275
9.1
1,017
Ease of Admin
8.8
295
9.1
909
Quality of Support
8.9
309
8.8
1,031
Has the product been a good partner in doing business?
9.3
288
9.2
910
Product Direction (% positive)
9.0
317
9.4
1,014
Features by Category
Not enough data
9.0
693
Compatibility
Not enough data
9.5
635
Not enough data
9.2
604
Not enough data
9.4
610
Not enough data
9.1
528
Management
Not enough data
9.3
588
Not enough data
9.1
587
Not enough data
9.4
611
Not enough data
9.4
609
Not enough data
9.0
586
Compliance
Not enough data
9.2
571
Not enough data
9.3
584
Not enough data
9.0
530
Agentic AI - Server Backup
Not enough data
8.7
49
Not enough data
8.6
49
Not enough data
8.7
51
Not enough data
8.5
49
Not enough data
8.7
50
Not enough data
8.8
49
Not enough data
9.0
391
Functionality
Not enough data
9.0
308
Not enough data
9.4
338
Not enough data
9.4
339
Not enough data
9.2
321
Compatibility
Not enough data
9.1
320
Not enough data
9.1
310
Not enough data
9.1
311
Management
Not enough data
8.9
287
Not enough data
9.2
310
Not enough data
9.2
322
Agentic AI - SaaS Backup
Not enough data
8.6
27
Not enough data
8.5
27
Not enough data
9.0
28
Not enough data
9.1
27
Not enough data
8.9
27
Not enough data
9.0
26
Not enough data
8.8
26
Not enough data
9.1
213
Administration
Not enough data
9.1
199
Not enough data
9.1
203
Not enough data
9.1
202
Not enough data
8.9
200
Maintenance
Not enough data
8.9
198
Not enough data
9.1
196
Not enough data
9.2
198
Not enough data
9.0
195
Security
Not enough data
9.1
201
Not enough data
9.2
199
Not enough data
9.1
196
Not enough data
9.2
196
Not enough data
9.2
195
Not enough data
9.1
194
Not enough data
9.0
566
Data Protection
Not enough data
8.9
438
Not enough data
9.2
487
Not enough data
9.0
488
Not enough data
8.9
459
Not enough data
9.0
457
Analysis
Not enough data
8.8
431
Not enough data
8.9
452
Not enough data
Feature Not Available
Administration
Not enough data
8.9
459
Not enough data
9.0
457
Not enough data
8.9
460
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
9.1
26
Not enough data
Scope
9.5
22
Not enough data
8.8
24
Not enough data
Security
9.0
26
Not enough data
9.2
24
Not enough data
9.4
24
Not enough data
Management
8.9
25
Not enough data
9.0
23
Not enough data
9.5
25
Not enough data
9.5
26
Not enough data
8.6
20
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.5
54
9.0
135
Administration
8.9
48
9.1
123
8.2
35
9.0
128
8.3
38
8.9
126
9.3
50
9.1
127
9.0
47
9.1
125
Functionality
8.9
42
8.9
122
7.4
33
8.9
122
8.6
41
9.1
126
7.3
32
9.2
126
Analysis
8.2
38
9.0
121
8.9
39
9.1
120
8.4
35
9.1
120
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.6
88
Not enough data
Generative AI
7.6
75
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.4
36
Services - Endpoint Detection & Response (EDR)
Not enough data
9.4
36
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Absolute Secure Endpoint
Absolute Secure Endpoint
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Absolute Secure Endpoint and Acronis Cyber Protect Cloud are categorized as Endpoint Protection Platforms
Unique Categories
Absolute Secure Endpoint
Absolute Secure Endpoint is categorized as Unified Endpoint Management (UEM) and Endpoint Management
Reviews
Reviewers' Company Size
Absolute Secure Endpoint
Absolute Secure Endpoint
Small-Business(50 or fewer emp.)
11.6%
Mid-Market(51-1000 emp.)
49.9%
Enterprise(> 1000 emp.)
38.5%
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Small-Business(50 or fewer emp.)
69.7%
Mid-Market(51-1000 emp.)
27.9%
Enterprise(> 1000 emp.)
2.4%
Reviewers' Industry
Absolute Secure Endpoint
Absolute Secure Endpoint
Information Technology and Services
12.8%
Hospital & Health Care
10.8%
Financial Services
8.8%
Computer & Network Security
4.3%
Computer Software
4.0%
Other
59.2%
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Information Technology and Services
35.0%
Computer & Network Security
25.3%
Computer Software
4.5%
Accounting
4.4%
Computer Networking
2.8%
Other
28.1%
Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise...
Add Microsoft Intune Enterprise Application Management
ManageEngine Endpoint Central
ManageEngine Endpoint Central
Add ManageEngine Endpoint Central
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud Alternatives
CyberSentriq
CyberSentriq
Add CyberSentriq
Druva Data Security Cloud
Druva Data Security Cloud
Add Druva Data Security Cloud
NinjaOne
NinjaOne
Add NinjaOne
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Discussions
Absolute Secure Endpoint
Absolute Secure Endpoint Discussions
What is Absolute's Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
What are the features that come with Absolute's different editions?
1 Comment
Official Response from Absolute Secure Endpoint
You can find the breakdown of which features are tied to the different editions of Absolute here: https://www.absolute.com/en/products/editions Read more
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud Discussions
What is Acronis Cyber Protect Cloud used for?
2 Comments
SH
Acronis Cyber protect is an all-in-one solution for backup, EDR, XDR, DLP, DR and management.Read more
what about the down time while the deployment of Acronis ?
1 Comment
Official Response from Acronis Cyber Protect Cloud
Hi! Thank you for your interest in Acronis Cyber Protect Cloud! Installation of our software usually doesn't require rebooting the systems, so no downtime...Read more
Please include Remote Accessing softwares with GUI for MAC and Linux
1 Comment
Official Response from Acronis Cyber Protect Cloud
Hi! Thank you for your interest in Acronis solutions! If you are looking for a remote desktop and monitoring tool that enables you to easily access and...Read more