Introducing G2.ai, the future of software buying.Try now

Compare Absolute Secure Endpoint and Carbon Black Cloud

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Absolute Secure Endpoint
Absolute Secure Endpoint
Star Rating
(407)4.6 out of 5
Market Segments
Mid-Market (49.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Absolute Secure Endpoint
Carbon Black Cloud
Carbon Black Cloud
Star Rating
(39)4.1 out of 5
Market Segments
Mid-Market (57.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Carbon Black Cloud
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that "Absolute Secure Endpoint" excels in "Endpoint Inclusiveness" with a score of 9.6, indicating a comprehensive approach to endpoint security that reviewers appreciate for its ability to cover a wide range of devices and operating systems.
  • Reviewers mention that "Carbon Black Cloud" shines in "Application Control" with a score of 9.3, highlighting its robust capabilities in managing and controlling applications, which users find essential for maintaining security in their environments.
  • G2 users note that "Absolute Secure Endpoint" has a superior "Quality of Support" rating of 9.0, with many reviewers praising the responsiveness and helpfulness of the support team, making it a preferred choice for organizations needing reliable assistance.
  • Users on G2 report that "Carbon Black Cloud" offers better "Malware Detection" with a score of 9.3, with reviewers emphasizing its effectiveness in identifying and mitigating threats, which is crucial for maintaining security posture.
  • Reviewers say that "Absolute Secure Endpoint" provides excellent "Device Compliance" with a score of 9.8, which users find beneficial for ensuring that all devices meet security standards and policies, thus reducing vulnerabilities.
  • Users mention that "Carbon Black Cloud" has a strong "Incident Reports" feature with a score of 9.2, allowing organizations to effectively track and respond to security incidents, which is a critical aspect of their security management strategy.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
Carbon Black Cloud
No pricing available
Free Trial
Absolute Secure Endpoint
No trial information available
Carbon Black Cloud
No trial information available
Ratings
Meets Requirements
9.1
323
8.2
32
Ease of Use
8.7
326
8.2
32
Ease of Setup
8.8
275
8.6
27
Ease of Admin
8.8
295
8.1
27
Quality of Support
8.9
309
8.4
31
Has the product been a good partner in doing business?
9.3
288
9.2
27
Product Direction (% positive)
9.0
317
7.8
32
Features by Category
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
9.1
26
Not enough data
Scope
9.5
22
Not enough data
8.8
24
Not enough data
Security
9.0
26
Not enough data
9.2
24
Not enough data
9.4
24
Not enough data
Management
8.9
25
Not enough data
9.0
23
Not enough data
9.5
25
Not enough data
9.5
26
Not enough data
8.6
20
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.5
54
8.3
10
Administration
8.9
48
8.0
5
8.2
35
Not enough data
8.3
38
8.3
6
9.3
50
7.7
5
9.0
47
8.3
6
Functionality
8.9
42
9.1
9
7.4
33
Not enough data
8.6
41
8.9
9
7.3
32
8.7
9
Analysis
8.2
38
7.5
8
8.9
39
7.8
9
8.4
35
8.3
9
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
Not enough data
Detection & Response
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.6
88
Not enough data
Generative AI
7.6
75
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Absolute Secure Endpoint
Absolute Secure Endpoint
Carbon Black Cloud
Carbon Black Cloud
Absolute Secure Endpoint and Carbon Black Cloud are categorized as Endpoint Protection Platforms and Endpoint Management
Unique Categories
Absolute Secure Endpoint
Absolute Secure Endpoint is categorized as Unified Endpoint Management (UEM)
Carbon Black Cloud
Carbon Black Cloud is categorized as Extended Detection and Response (XDR) Platforms and Antivirus
Reviews
Reviewers' Company Size
Absolute Secure Endpoint
Absolute Secure Endpoint
Small-Business(50 or fewer emp.)
11.6%
Mid-Market(51-1000 emp.)
49.9%
Enterprise(> 1000 emp.)
38.5%
Carbon Black Cloud
Carbon Black Cloud
Small-Business(50 or fewer emp.)
10.5%
Mid-Market(51-1000 emp.)
57.9%
Enterprise(> 1000 emp.)
31.6%
Reviewers' Industry
Absolute Secure Endpoint
Absolute Secure Endpoint
Information Technology and Services
12.8%
Hospital & Health Care
10.8%
Financial Services
8.8%
Computer & Network Security
4.3%
Primary/Secondary Education
4.0%
Other
59.2%
Carbon Black Cloud
Carbon Black Cloud
Financial Services
13.2%
Telecommunications
7.9%
Construction
7.9%
Retail
5.3%
Medical Devices
5.3%
Other
60.5%
Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise Application Management
Add Microsoft Intune Enterprise Application Management
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Add Symantec End-user Endpoint Security
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
Carbon Black Cloud
Carbon Black Cloud Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
ThreatDown
ThreatDown
Add ThreatDown
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
Discussions
Absolute Secure Endpoint
Absolute Secure Endpoint Discussions
Is there a way to exclude executables from the full list?
1 Comment
Official Response from Absolute Secure Endpoint
Thanks for your comment, James. The ability to filter executables shown in application reports is part of our product roadmap and will be made available...Read more
What is Absolute's Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
Carbon Black Cloud
Carbon Black Cloud Discussions
Monty the Mongoose crying
Carbon Black Cloud has no discussions with answers