Introducing G2.ai, the future of software buying.Try now

Compare Absolute Secure Endpoint and Atera

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Absolute Secure Endpoint
Absolute Secure Endpoint
Star Rating
(407)4.6 out of 5
Market Segments
Mid-Market (49.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Absolute Secure Endpoint
Atera
Atera
Star Rating
(945)4.6 out of 5
Market Segments
Small-Business (60.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 8 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Absolute Secure Endpoint excels in Endpoint Inclusiveness, scoring 9.6, which reviewers mention allows for a broader range of devices to be managed effectively compared to Atera's score of 6.9. This feature is particularly beneficial for organizations with diverse hardware environments.
  • Reviewers mention that Absolute Secure Endpoint's Remote Wiping feature, rated at 9.4, provides a robust solution for data security, especially in cases of device loss. In contrast, Atera's score of 5.4 indicates a significant gap in this critical area, which could be a concern for businesses prioritizing data protection.
  • Users on G2 highlight the superior Device Compliance capabilities of Absolute Secure Endpoint, scoring 9.8, which ensures that all devices meet security standards. Atera's score of 7.1 suggests that it may not enforce compliance as effectively, potentially leaving gaps in security protocols.
  • Reviewers mention that Absolute Secure Endpoint's Reporting and Alerts feature, rated at 9.3, provides comprehensive insights and timely notifications, which users find invaluable for proactive security management. Atera's score of 7.9 indicates that its reporting capabilities may not be as robust, leading to less effective monitoring.
  • Users say that Absolute Secure Endpoint's Ease of Use, with a score of 8.6, is complemented by its intuitive interface, making it easier for teams to adopt. In comparison, Atera's higher score of 9.2 suggests that it may offer an even more user-friendly experience, which could be a deciding factor for smaller businesses.
  • G2 users report that both products have a Quality of Support score of 9.0, indicating that both Absolute Secure Endpoint and Atera provide reliable customer service. However, reviewers mention that Absolute Secure Endpoint has been a slightly better partner in business with a score of 9.3, compared to Atera's 9.2, suggesting a marginally stronger commitment to customer success.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
Atera
Free Trial
Free Trial
Browse all 8 pricing plans
Free Trial
Absolute Secure Endpoint
No trial information available
Atera
Free Trial is available
Ratings
Meets Requirements
9.1
323
8.9
835
Ease of Use
8.7
326
9.2
852
Ease of Setup
8.8
275
9.1
706
Ease of Admin
8.8
295
9.0
578
Quality of Support
8.9
309
9.0
794
Has the product been a good partner in doing business?
9.3
288
9.2
572
Product Direction (% positive)
9.0
317
9.4
823
Features by Category
Not enough data
8.0
328
Ticket and Case Management
Not enough data
8.6
301
Not enough data
8.6
301
Not enough data
8.5
298
Not enough data
8.3
290
Not enough data
8.2
284
Not enough data
8.3
291
Not enough data
8.2
291
Not enough data
8.2
286
Generative AI
Not enough data
7.2
236
Not enough data
7.3
236
Agentic AI - Help Desk
Not enough data
8.3
32
Not enough data
8.5
32
Not enough data
8.6
32
Communication Channels
Not enough data
8.3
286
Not enough data
8.7
286
Not enough data
8.1
281
Not enough data
6.4
268
Not enough data
6.2
266
Platform
Not enough data
7.2
292
Not enough data
7.8
302
Not enough data
8.4
300
Not enough data
8.0
304
Not enough data
8.2
305
Not enough data
8.5
302
IT Service Management (ITSM) ToolsHide 22 FeaturesShow 22 Features
Not enough data
8.0
169
Administration
Not enough data
8.1
156
Not enough data
8.4
158
Not enough data
8.7
161
Service Desk
Not enough data
8.5
156
Not enough data
8.3
156
Not enough data
8.4
155
Management
Not enough data
8.6
152
Not enough data
8.9
152
Not enough data
8.7
150
Not enough data
8.4
149
Not enough data
8.1
145
Functionality
Not enough data
8.4
153
Not enough data
8.5
151
Not enough data
8.9
153
Not enough data
8.7
151
Agentic AI - IT Service Management (ITSM) Tools
Not enough data
7.3
21
Not enough data
6.7
21
Not enough data
7.0
21
Not enough data
6.8
21
Not enough data
7.2
21
Not enough data
7.0
21
Not enough data
7.3
20
Remote Monitoring & Management (RMM)Hide 19 FeaturesShow 19 Features
Not enough data
8.2
606
Inventory Management - Remote Monitoring & Management (RMM)
Not enough data
8.9
576
|
Verified
Not enough data
8.4
69
Not enough data
8.0
66
Monitoring and Management
Not enough data
9.0
571
|
Verified
Not enough data
8.3
539
|
Verified
Not enough data
8.3
535
|
Verified
Not enough data
8.6
569
|
Verified
Not enough data
8.3
70
IT Operations & Workflow - Remote Monitoring & Management (RMM)
Not enough data
8.4
70
Service Management
Not enough data
9.1
570
|
Verified
Not enough data
8.5
69
Not enough data
8.2
75
Agentic AI - Remote Monitoring & Management (RMM)
Not enough data
7.7
73
Not enough data
7.6
73
Not enough data
7.8
72
Not enough data
7.6
73
Not enough data
7.7
72
Not enough data
7.5
73
Not enough data
7.4
73
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
9.1
26
7.5
33
Scope
9.5
22
6.8
30
8.8
24
8.0
32
Security
9.0
26
7.9
32
9.2
24
7.2
30
9.4
24
5.7
27
Management
8.9
25
8.0
28
9.0
23
7.7
27
9.5
25
7.5
26
9.5
26
7.8
28
8.6
20
6.1
25
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
7.8
10
Not enough data
7.5
10
Not enough data
7.7
10
Not enough data
8.0
10
Not enough data
7.7
10
Not enough data
7.8
10
Not enough data
8.0
10
Not enough data
8.1
300
Functionality
Not enough data
8.9
281
Not enough data
8.9
286
Not enough data
8.2
273
Not enough data
8.6
263
Monitoring - Network Monitoring
Not enough data
8.3
35
Not enough data
8.7
36
Not enough data
8.8
33
Management
Not enough data
8.4
259
Not enough data
8.4
260
Not enough data
7.9
248
Analytics - Network Monitoring
Not enough data
8.2
34
Not enough data
8.0
34
Security - Network Monitoring
Not enough data
8.4
34
Not enough data
7.8
35
Not enough data
8.3
34
Network Performance - Network Monitoring
Not enough data
8.2
34
Not enough data
8.1
34
AI Automation - Network Monitoring
Not enough data
7.7
33
Not enough data
7.6
33
Not enough data
7.4
33
Agentic AI - Network Monitoring
Not enough data
7.6
28
Not enough data
7.6
28
Not enough data
7.6
28
Not enough data
7.4
28
Not enough data
7.4
28
Not enough data
7.4
28
Not enough data
7.6
28
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.5
54
Not enough data
Administration
8.9
48
Not enough data
8.2
35
Not enough data
8.3
38
Not enough data
9.3
50
Not enough data
9.0
47
Not enough data
Functionality
8.9
42
Not enough data
7.4
33
Not enough data
8.6
41
Not enough data
7.3
32
Not enough data
Analysis
8.2
38
Not enough data
8.9
39
Not enough data
8.4
35
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Issue Resolution
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - AIOps Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
7.9
233
Asset Inventory
Not enough data
8.8
224
Not enough data
8.7
217
Not enough data
7.8
209
Not enough data
7.1
205
Not enough data
7.9
214
Generative AI
Not enough data
7.2
195
Not enough data
7.2
192
Agentic AI - IT Asset Management
Not enough data
8.1
31
Not enough data
7.8
31
Not enough data
8.1
31
Not enough data
7.6
31
Not enough data
7.9
30
Not enough data
8.0
31
Not enough data
7.7
31
Management
Not enough data
8.8
218
Not enough data
8.1
208
Not enough data
7.6
206
Not enough data
8.0
213
AI Agents For Business OperationsHide 17 FeaturesShow 17 Features
Not enough data
9.5
10
Responses
Not enough data
9.8
9
Not enough data
9.1
9
Not enough data
9.6
9
Automation - AI Agents
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Platform
Not enough data
9.6
9
Not enough data
9.6
9
Not enough data
9.2
8
Autonomy - AI Agents
Not enough data
9.3
9
Not enough data
9.6
9
Not enough data
9.6
9
Not enough data
9.8
9
Generative AI
Not enough data
9.6
9
Not enough data
9.6
9
Not enough data
7.8
467
Administration
Not enough data
8.7
439
Not enough data
8.4
436
Not enough data
7.3
383
Not enough data
9.0
439
Not enough data
8.2
421
Not enough data
8.2
440
Maintenance
Not enough data
8.9
440
Not enough data
7.8
391
Communication
Not enough data
Feature Not Available
Not enough data
6.1
364
Not enough data
6.1
357
Not enough data
6.9
368
Security
Not enough data
7.8
380
Not enough data
8.0
388
Device Support
Not enough data
7.4
390
Not enough data
8.2
394
Not enough data
8.2
392
Performance
Not enough data
8.3
425
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.6
88
7.2
285
Generative AI
7.6
75
7.2
281
Not enough data
7.5
12
Automation - AI IT Agents
Not enough data
8.0
11
Not enough data
7.9
11
Autonomy - AI IT Agents
Not enough data
7.7
11
Not enough data
7.6
11
Not enough data
7.9
11
Not enough data
8.3
11
IT Ticket Management - AI IT Agents
Not enough data
7.9
11
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
6.8
11
Not enough data
7.3
11
IT Support Automation - AI IT Agents
Not enough data
7.9
11
Not enough data
7.7
11
Not enough data
7.6
11
Not enough data
7.9
11
Not enough data
7.9
11
Autonomous Endpoint Management (AEM)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Generative AI - Autonomous Endpoint Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Monitoring and Management - Autonomous Endpoint Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
8.2
229
Incident Management
Not enough data
8.4
210
Not enough data
8.5
212
Not enough data
8.8
206
Not enough data
8.2
211
Not enough data
8.1
203
Reporting
Not enough data
8.6
210
Not enough data
8.4
207
Not enough data
7.8
201
Access & Usability
Not enough data
7.4
207
Not enough data
8.5
204
Not enough data
8.0
201
Not enough data
8.3
197
Agentic AI - Service Desk
Not enough data
8.5
26
Not enough data
8.1
26
Not enough data
8.0
25
Not enough data
8.1
25
Not enough data
8.1
26
Not enough data
7.7
26
Not enough data
8.1
26
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enterprise IT ManagementHide 18 FeaturesShow 18 Features
Not enough data
8.4
84
Analysis
Not enough data
8.2
76
Platform
Not enough data
7.9
77
Not enough data
8.8
79
Not enough data
8.1
76
Not enough data
8.3
81
Not enough data
8.5
80
Security
Not enough data
8.3
80
Not enough data
9.0
81
Not enough data
7.4
78
Not enough data
8.2
79
Not enough data
8.1
76
Agentic AI - Enterprise IT Management
Not enough data
8.5
11
Not enough data
8.6
11
Not enough data
8.5
11
Not enough data
8.6
11
Not enough data
8.3
11
Not enough data
8.9
11
Not enough data
8.6
11
Not enough data
Not enough data
Agentic AI - AI Agents
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Absolute Secure Endpoint
Absolute Secure Endpoint
Small-Business(50 or fewer emp.)
11.6%
Mid-Market(51-1000 emp.)
49.9%
Enterprise(> 1000 emp.)
38.5%
Atera
Atera
Small-Business(50 or fewer emp.)
60.2%
Mid-Market(51-1000 emp.)
35.6%
Enterprise(> 1000 emp.)
4.3%
Reviewers' Industry
Absolute Secure Endpoint
Absolute Secure Endpoint
Information Technology and Services
12.8%
Hospital & Health Care
10.8%
Financial Services
8.8%
Computer & Network Security
4.3%
Primary/Secondary Education
4.0%
Other
59.2%
Atera
Atera
Information Technology and Services
31.0%
Computer & Network Security
13.4%
Hospital & Health Care
3.4%
Telecommunications
3.1%
Manufacturing
2.9%
Other
46.2%
Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise Application Management
Add Microsoft Intune Enterprise Application Management
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Add Symantec End-user Endpoint Security
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
Atera
Atera Alternatives
NinjaOne
NinjaOne
Add NinjaOne
SuperOps
SuperOps
Add SuperOps
TeamViewer
TeamViewer
Add TeamViewer
Action1
Action1
Add Action1
Discussions
Absolute Secure Endpoint
Absolute Secure Endpoint Discussions
Is there a way to exclude executables from the full list?
1 Comment
Official Response from Absolute Secure Endpoint
Thanks for your comment, James. The ability to filter executables shown in application reports is part of our product roadmap and will be made available...Read more
What is Absolute's Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
Atera
Atera Discussions
Is atera safe?
2 Comments
How does your pricing compare to the traditional RMM vendors?
1 Comment
Official Response from Atera
At Atera, you only get billed a fixed monthly fee for the number of technicians that actually use our software. So you don’t pay more when you grow or add...Read more
Can I generate automatically a Service Ticket from an Agent Alert?
1 Comment
Official Response from Atera
It is possible to automatically generate a ticket from an alert. We do not recommend it because it can create a lot of noise in the ticket dashboard. The...Read more