Compare Absolute Secure Endpoint and JumpCloud

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Absolute Secure Endpoint
Absolute Secure Endpoint
Star Rating
(407)4.6 out of 5
Market Segments
Mid-Market (49.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Absolute Secure Endpoint
JumpCloud
JumpCloud
Star Rating
(3,734)4.5 out of 5
Market Segments
Mid-Market (53.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$3.00 1 User Per Month
Free Trial is available
Learn more about JumpCloud
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Absolute Secure Endpoint excels in Endpoint Protection, scoring 9.3, with reviewers mentioning its robust security features like advanced threat detection and real-time monitoring, which provide peace of mind for organizations.
  • Reviewers mention that JumpCloud shines in Ease of Use, achieving a score of 9.0, with users on G2 highlighting its intuitive interface and straightforward navigation, making it easier for teams to manage user access and devices.
  • G2 users note that Absolute Secure Endpoint has superior Device Compliance capabilities, scoring 9.8, with reviewers praising its comprehensive compliance checks that ensure devices meet security standards, which is crucial for regulatory requirements.
  • Users say that JumpCloud offers excellent Multi-OS Support, scoring 9.1, with reviewers mentioning its ability to seamlessly manage devices across various operating systems, which is beneficial for diverse IT environments.
  • Reviewers mention that Absolute Secure Endpoint provides outstanding Quality of Support, with a score of 9.0, highlighting the responsiveness and expertise of the support team, which is essential for resolving issues quickly.
  • Users report that Absolute Secure Endpoint leads in Endpoint Inclusiveness, scoring 9.6, with reviewers emphasizing its ability to support a wide range of devices, ensuring that all endpoints are adequately protected and managed.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
JumpCloud
Cloud Directory
$3.00
1 User Per Month
Learn more about JumpCloud
Free Trial
Absolute Secure Endpoint
No trial information available
JumpCloud
Free Trial is available
Ratings
Meets Requirements
9.1
323
8.8
3,055
Ease of Use
8.7
326
9.0
3,086
Ease of Setup
8.8
275
8.8
2,846
Ease of Admin
8.8
295
9.0
2,667
Quality of Support
8.9
309
8.8
2,787
Has the product been a good partner in doing business?
9.3
288
9.0
2,531
Product Direction (% positive)
9.0
317
9.3
2,959
Features by Category
Not enough data
8.8
1,519
Authentication Options
Not enough data
9.1
1420
Not enough data
8.9
1369
Not enough data
9.1
1379
Not enough data
9.0
1351
Not enough data
8.9
1272
Not enough data
8.8
1201
Access Control Types
Not enough data
8.9
1295
Not enough data
8.9
1267
Not enough data
8.6
1232
Not enough data
8.4
1052
Not enough data
8.4
1114
Administration
Not enough data
8.8
1157
Not enough data
9.2
1323
Not enough data
9.1
1364
Not enough data
8.7
1326
Not enough data
8.8
1311
Platform
Not enough data
9.1
1307
Not enough data
8.8
1083
Not enough data
9.0
1231
Not enough data
8.5
1057
Not enough data
8.2
1228
Not enough data
8.4
1178
Not enough data
8.5
1119
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
Not enough data
8.4
900
User on/off Boarding
Not enough data
8.6
632
Not enough data
8.6
729
|
Verified
Not enough data
8.8
794
|
Verified
Not enough data
8.9
748
|
Verified
Not enough data
9.0
730
|
Verified
Not enough data
8.2
570
User Maintenance
Not enough data
8.9
787
|
Verified
Not enough data
8.5
724
|
Verified
Not enough data
8.5
646
|
Verified
Governance
Not enough data
8.0
578
Not enough data
8.3
633
|
Verified
Administration
Not enough data
8.1
747
|
Verified
Not enough data
7.4
576
Not enough data
8.6
756
|
Verified
Not enough data
8.3
621
|
Verified
Not enough data
8.7
20
Tracking
Not enough data
8.3
19
Not enough data
9.0
20
Not enough data
Feature Not Available
Management
Not enough data
8.9
19
Not enough data
8.5
19
Not enough data
9.1
19
Insights
Not enough data
9.2
16
Not enough data
8.8
16
Not enough data
Feature Not Available
Not enough data
8.3
17
Agentic AI - SaaS Spend Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.2
14
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Cloud Directory ServicesHide 11 FeaturesShow 11 Features
Not enough data
8.7
1,512
Access Control
Not enough data
8.8
1340
Not enough data
8.9
1312
Not enough data
8.5
1231
Not enough data
8.3
1069
Administration
Not enough data
8.7
1200
Not enough data
8.7
1309
Not enough data
8.4
1110
Not enough data
8.5
1259
Functionality
Not enough data
9.0
1284
Not enough data
9.1
1280
Not enough data
8.9
1238
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
9.1
26
8.7
385
Scope
9.5
22
Feature Not Available
8.8
24
9.1
361
Security
9.0
26
8.5
361
9.2
24
Feature Not Available
9.4
24
8.7
349
Management
8.9
25
9.1
357
9.0
23
8.9
352
9.5
25
8.9
356
9.5
26
8.7
347
8.6
20
8.1
330
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
Not enough data
8.8
658
Administration
Not enough data
9.0
579
Not enough data
Feature Not Available
Not enough data
8.8
532
Not enough data
8.8
528
Not enough data
9.2
566
Not enough data
8.8
512
Functionality
Not enough data
9.2
551
Not enough data
9.2
547
Not enough data
8.6
470
Not enough data
8.6
437
Not enough data
9.1
536
Not enough data
9.0
529
Not enough data
8.7
489
Not enough data
8.3
81
Not enough data
8.9
474
Not enough data
8.7
442
Monitoring
Not enough data
8.7
516
Not enough data
8.6
535
Not enough data
Feature Not Available
Reporting
Not enough data
8.6
516
Not enough data
8.5
518
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.5
54
Not enough data
Administration
8.9
48
Not enough data
8.2
35
Not enough data
8.3
38
Not enough data
9.3
50
Not enough data
9.0
47
Not enough data
Functionality
8.9
42
Not enough data
7.4
33
Not enough data
8.6
41
Not enough data
7.3
32
Not enough data
Analysis
8.2
38
Not enough data
8.9
39
Not enough data
8.4
35
Not enough data
Password Policy EnforcementHide 12 FeaturesShow 12 Features
Not enough data
8.9
1,157
Functionality
Not enough data
8.8
905
Not enough data
8.8
940
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Administration
Not enough data
9.0
1046
Not enough data
9.2
1066
Not enough data
8.7
1023
Not enough data
8.8
996
Not enough data
Feature Not Available
Compliance
Not enough data
8.7
806
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
Not enough data
8.7
1,517
Functionality
Not enough data
9.0
1396
Not enough data
8.4
1200
Not enough data
9.1
1347
Not enough data
9.0
1346
Not enough data
9.2
1381
Not enough data
9.1
1338
Type
Not enough data
8.2
1063
Not enough data
9.0
1359
Reporting
Not enough data
8.4
1250
Not enough data
8.4
1288
Not enough data
8.5
161
Not enough data
8.4
162
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
8.8
157
Administration & Governance - Identity and Access Management (IAM)
Not enough data
8.6
161
Not enough data
8.7
159
Generative AI - Identity and Access Management (IAM)
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.4
656
Administration
Not enough data
8.5
579
Not enough data
8.1
560
Not enough data
8.0
538
Not enough data
8.3
570
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Maintenance
Not enough data
8.8
584
Not enough data
7.8
515
Communication
Not enough data
7.9
519
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Security
Not enough data
8.8
556
Not enough data
8.8
548
Device Support
Not enough data
Feature Not Available
Not enough data
8.9
561
Not enough data
8.9
560
Performance
Not enough data
8.5
566
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.6
88
Not enough data
Generative AI
7.6
75
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Device Management (MDM)Hide 18 FeaturesShow 18 Features
Not enough data
8.6
1,230
Platform - Mobile Device Management (MDM)
Not enough data
8.8
1066
Operating System
Not enough data
8.9
1118
Not enough data
8.7
1134
Not enough data
8.2
986
Management
Not enough data
8.5
1117
Not enough data
8.3
1056
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.4
1054
Security
Not enough data
8.8
1085
Not enough data
Feature Not Available
Agentic AI - Mobile Device Management (MDM)
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Generative AI - Security Compliance
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Categories
Categories
Shared Categories
Absolute Secure Endpoint
Absolute Secure Endpoint
JumpCloud
JumpCloud
Absolute Secure Endpoint and JumpCloud are categorized as Unified Endpoint Management (UEM)
Reviews
Reviewers' Company Size
Absolute Secure Endpoint
Absolute Secure Endpoint
Small-Business(50 or fewer emp.)
11.6%
Mid-Market(51-1000 emp.)
49.9%
Enterprise(> 1000 emp.)
38.5%
JumpCloud
JumpCloud
Small-Business(50 or fewer emp.)
36.1%
Mid-Market(51-1000 emp.)
53.3%
Enterprise(> 1000 emp.)
10.6%
Reviewers' Industry
Absolute Secure Endpoint
Absolute Secure Endpoint
Information Technology and Services
12.8%
Hospital & Health Care
10.8%
Financial Services
8.8%
Computer & Network Security
4.3%
Primary/Secondary Education
4.0%
Other
59.2%
JumpCloud
JumpCloud
Information Technology and Services
22.5%
Computer Software
12.2%
Financial Services
7.9%
Computer & Network Security
7.3%
Hospital & Health Care
2.8%
Other
47.2%
Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise Application Management
Add Microsoft Intune Enterprise Application Management
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Add Symantec End-user Endpoint Security
SentinelOne Singularity
SentinelOne
Add SentinelOne Singularity
JumpCloud
JumpCloud Alternatives
Rippling
Rippling
Add Rippling
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Okta
Okta
Add Okta
OneLogin
OneLogin
Add OneLogin
Discussions
Absolute Secure Endpoint
Absolute Secure Endpoint Discussions
Is there a way to exclude executables from the full list?
1 Comment
Official Response from Absolute Secure Endpoint
Thanks for your comment, James. The ability to filter executables shown in application reports is part of our product roadmap and will be made available...Read more
What is Absolute's Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
JumpCloud
JumpCloud Discussions
What is JumpCloud used for?
8 Comments
Jeff B.
JB
JumpCloud is an identity provider that allows you to consolidate all of your authentication/logins, apps and devices, to a Single Sign-On experience for your...Read more
Do you want a copy?
4 Comments
Bellucci30 B.
BB
What is JumpCloud used for?
3 Comments
Kate G.
KG
Not just SSO. We use JumpCloud for device management (policy groups, MDM), security management (MFA), user authentication (LDAP, Radius) and user management. Read more