G2 reviewers report that Absolute Secure Endpoint excels in device protection, with users highlighting its ability to maintain security even when key hardware components are replaced. This level of persistent protection is particularly valued in environments with high mobility and remote work.
Users say that CrowdStrike Falcon stands out for its unobtrusive operation, running quietly in the background without impacting system performance. This seamless integration is a significant advantage for those who prioritize system speed and efficiency while maintaining robust security.
According to verified reviews, Absolute Secure Endpoint provides comprehensive visibility over devices, which is crucial for organizations managing remote teams. Users appreciate knowing the exact locations of their devices, enhancing their ability to respond to potential security threats.
Reviewers mention that CrowdStrike Falcon offers top-level endpoint detection and response (EDR) capabilities, with real-time threat detection powered by AI and machine learning. This feature is particularly appealing for organizations looking for proactive security measures that can quickly adapt to emerging threats.
G2 reviewers highlight that while both products have similar star ratings, CrowdStrike Falcon's higher overall G2 Score reflects greater user satisfaction and market presence. This suggests that users may find more consistent performance and support with CrowdStrike, especially in larger enterprise environments.
Users note that Absolute Secure Endpoint has improved over time, with ongoing enhancements based on user feedback. This commitment to evolving the product is a positive sign for organizations looking for a long-term partner in endpoint security.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
CrowdStrike Falcon Endpoint Protection Platform
Falcon Pro
Free Trial
Provides superior protection from cyber attacks, detects malicious activity, and offers immediate response capabilities for your business.
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
What are the features that come with Absolute's different editions?
1 Comment
Official Response from Absolute Secure Endpoint
You can find the breakdown of which features are tied to the different editions of Absolute here: https://www.absolute.com/en/products/editions Read more
How to uninstall the CS sensor remotely from any host?
2 Comments
BB
This can be done via RTR if enabled or via deploying CS's uninstall tool through GPO, or whatever other deployment package manager you are using.Read more
How do people see Firewall logs in Crowdstrike . Is it Possible to view Firewall logs or requires a separated application to pull those into CS console.
1 Comment
BB
You can see firewall changes and rule modifications under the event_SimpleNames "FirewallChangeOption" and "FirewallSetRule". CrowdStrike's Firewall license...Read more
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.