Compare Absolute Secure Endpoint and Datto RMM

At a Glance
Absolute Secure Endpoint
Absolute Secure Endpoint
Star Rating
(407)4.6 out of 5
Market Segments
Mid-Market (49.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Absolute Secure Endpoint
Datto RMM
Datto RMM
Star Rating
(730)4.5 out of 5
Market Segments
Small-Business (62.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Datto RMM

Absolute Secure Endpoint vs Datto RMM

When assessing the two solutions, reviewers found Datto RMM easier to use and administer. However, reviewers felt that Absolute Secure Endpoint was easier to do business with overall. Finally, reviewers felt that the products are equally easy to set up.

  • Reviewers felt that Absolute Secure Endpoint meets the needs of their business better than Datto RMM.
  • When comparing quality of ongoing product support, reviewers felt that Absolute Secure Endpoint is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Datto RMM over Absolute Secure Endpoint.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
Datto RMM
No pricing available
Free Trial
Absolute Secure Endpoint
No trial information available
Datto RMM
Free Trial is available
Ratings
Meets Requirements
9.1
323
8.9
657
Ease of Use
8.7
326
8.9
703
Ease of Setup
8.8
275
8.8
611
Ease of Admin
8.8
295
8.9
504
Quality of Support
8.9
309
8.4
595
Has the product been a good partner in doing business?
9.3
288
9.0
477
Product Direction (% positive)
9.0
317
9.1
655
Features by Category
Remote Monitoring & Management (RMM)Hide 19 FeaturesShow 19 Features
Not enough data
7.9
558
Inventory Management - Remote Monitoring & Management (RMM)
Not enough data
9.1
551
Not enough data
8.8
36
Not enough data
7.9
30
Monitoring and Management
Not enough data
9.2
546
Not enough data
8.5
535
Not enough data
8.5
534
Not enough data
8.6
541
Not enough data
8.5
30
IT Operations & Workflow - Remote Monitoring & Management (RMM)
Not enough data
8.7
31
Service Management
Not enough data
8.8
539
Not enough data
8.3
31
Not enough data
7.2
32
Agentic AI - Remote Monitoring & Management (RMM)
Not enough data
7.2
29
Not enough data
6.9
28
Not enough data
7.4
28
Not enough data
7.0
27
Not enough data
6.7
25
Not enough data
6.7
25
Not enough data
6.7
26
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
9.1
26
Not enough data
Scope
9.5
22
Not enough data
8.8
24
Not enough data
Security
9.0
26
Not enough data
9.2
24
Not enough data
9.4
24
Not enough data
Management
8.9
25
Not enough data
9.0
23
Not enough data
9.5
25
Not enough data
9.5
26
Not enough data
8.6
20
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.5
54
Not enough data
Administration
8.9
48
Not enough data
8.2
35
Not enough data
8.3
38
Not enough data
9.3
50
Not enough data
9.0
47
Not enough data
Functionality
8.9
42
Not enough data
7.4
33
Not enough data
8.6
41
Not enough data
7.3
32
Not enough data
Analysis
8.2
38
Not enough data
8.9
39
Not enough data
8.4
35
Not enough data
Not enough data
7.7
484
Administration
Not enough data
8.7
476
Not enough data
8.3
477
Not enough data
7.2
457
Not enough data
8.5
468
Not enough data
8.5
463
Not enough data
8.6
471
Maintenance
Not enough data
9.1
474
Not enough data
7.1
446
Communication
Not enough data
8.0
462
Not enough data
6.0
433
Not enough data
5.9
430
Not enough data
6.5
433
Security
Not enough data
7.8
441
Not enough data
8.1
449
Device Support
Not enough data
6.1
439
Not enough data
7.6
449
Not enough data
7.7
449
Performance
Not enough data
8.2
459
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.6
88
7.0
266
Generative AI
7.6
75
7.0
265
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Absolute Secure Endpoint
Absolute Secure Endpoint
Datto RMM
Datto RMM
Absolute Secure Endpoint and Datto RMM are categorized as Endpoint Management
Unique Categories
Absolute Secure Endpoint
Absolute Secure Endpoint is categorized as Unified Endpoint Management (UEM) and Endpoint Protection Platforms
Reviews
Reviewers' Company Size
Absolute Secure Endpoint
Absolute Secure Endpoint
Small-Business(50 or fewer emp.)
11.6%
Mid-Market(51-1000 emp.)
49.9%
Enterprise(> 1000 emp.)
38.5%
Datto RMM
Datto RMM
Small-Business(50 or fewer emp.)
62.7%
Mid-Market(51-1000 emp.)
33.2%
Enterprise(> 1000 emp.)
4.0%
Reviewers' Industry
Absolute Secure Endpoint
Absolute Secure Endpoint
Information Technology and Services
12.8%
Hospital & Health Care
10.8%
Financial Services
8.8%
Computer & Network Security
4.3%
Computer Software
4.0%
Other
59.2%
Datto RMM
Datto RMM
Information Technology and Services
44.5%
Computer & Network Security
23.8%
Computer Networking
2.2%
Manufacturing
2.1%
Hospital & Health Care
2.1%
Other
25.3%
Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise...
Add Microsoft Intune Enterprise Application Management
ManageEngine Endpoint Central
ManageEngine Endpoint Central
Add ManageEngine Endpoint Central
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
Datto RMM
Datto RMM Alternatives
NinjaOne
NinjaOne
Add NinjaOne
Atera
Atera
Add Atera
Pulseway
Pulseway
Add Pulseway
N-able N-central
N-able N-central
Add N-able N-central
Discussions
Absolute Secure Endpoint
Absolute Secure Endpoint Discussions
What is Absolute's Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
What are the features that come with Absolute's different editions?
1 Comment
Official Response from Absolute Secure Endpoint
You can find the breakdown of which features are tied to the different editions of Absolute here: https://www.absolute.com/en/products/editions Read more
Datto RMM
Datto RMM Discussions
What is datto RMM used for?
2 Comments
Anthony W.
AW
We use Datto for patch management and limited software deployments. We also occasionally will use it to remotely access a workstation. Read more
What can RMM see?
2 Comments
Matt S.
MS
Datto RMM has insight into everything once you install the agents, Everything from computer specifications, activity logs,all the way up to being able to...Read more
Monty the Mongoose crying
Datto RMM has no more discussions with answers