Compare Absolute Secure Endpoint and KACE Unified Endpoint Manager

At a Glance
Absolute Secure Endpoint
Absolute Secure Endpoint
Star Rating
(407)4.6 out of 5
Market Segments
Mid-Market (49.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Absolute Secure Endpoint
KACE Unified Endpoint Manager
KACE Unified Endpoint Manager
Star Rating
(95)4.1 out of 5
Market Segments
Mid-Market (66.7% of reviews)
Information
Pros & Cons
Not enough data
Entry-Level Pricing
No pricing available
Learn more about KACE Unified Endpoint Manager
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Absolute Secure Endpoint excels in providing robust device protection, with users highlighting its ability to maintain security even when key hardware components are replaced. This level of device management is particularly reassuring for organizations with remote users.
  • Users say KACE Unified Endpoint Manager offers a clean and intuitive interface, making it easy to manage software installations and updates. Reviewers appreciate how it simplifies patch management, allowing IT teams to focus on other tasks without worrying about software vulnerabilities.
  • According to verified reviews, Absolute Secure Endpoint stands out for its comprehensive visibility over devices, which is crucial for organizations with a distributed workforce. Users feel confident knowing the exact locations of their devices, enhancing overall security management.
  • Reviewers mention that KACE Unified Endpoint Manager is a versatile tool for IT operations, capable of handling asset tracking, scripting, and inventory management. This multifunctionality is seen as a significant advantage, especially for teams looking for a cost-effective solution.
  • G2 reviewers highlight that Absolute Secure Endpoint has improved over time, with consistent updates and user feedback shaping its development. This commitment to product evolution has led to enhanced functionality and user satisfaction.
  • Users express that while KACE Unified Endpoint Manager is effective for day-to-day operations, it faces challenges in areas like ease of setup and overall user experience compared to Absolute Secure Endpoint. Some users find the initial configuration to be less intuitive, which can impact onboarding efficiency.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
KACE Unified Endpoint Manager
No pricing available
Free Trial
Absolute Secure Endpoint
No trial information available
KACE Unified Endpoint Manager
Free Trial is available
Ratings
Meets Requirements
9.1
323
8.7
81
Ease of Use
8.7
326
7.9
81
Ease of Setup
8.8
275
7.6
69
Ease of Admin
8.8
295
8.2
71
Quality of Support
8.9
309
8.1
75
Has the product been a good partner in doing business?
9.3
288
8.3
68
Product Direction (% positive)
9.0
317
7.5
79
Features by Category
OS Imaging & DeploymentHide 10 FeaturesShow 10 Features
Not enough data
8.9
8
Administration
Not enough data
9.7
6
Not enough data
8.8
8
Not enough data
9.0
7
Not enough data
9.2
8
Deployment
Not enough data
7.9
8
Not enough data
8.6
7
Not enough data
9.0
7
Imaging
Not enough data
9.0
8
Not enough data
8.8
8
Not enough data
9.0
8
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
9.1
26
Not enough data
Scope
9.5
22
Not enough data
8.8
24
Not enough data
Security
9.0
26
Not enough data
9.2
24
Not enough data
9.4
24
Not enough data
Management
8.9
25
Not enough data
9.0
23
Not enough data
9.5
25
Not enough data
9.5
26
Not enough data
8.6
20
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.5
54
Not enough data
Administration
8.9
48
Not enough data
8.2
35
Not enough data
8.3
38
Not enough data
9.3
50
Not enough data
9.0
47
Not enough data
Functionality
8.9
42
Not enough data
7.4
33
Not enough data
8.6
41
Not enough data
7.3
32
Not enough data
Analysis
8.2
38
Not enough data
8.9
39
Not enough data
8.4
35
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.6
88
Not enough data
Generative AI
7.6
75
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Device Management (MDM)Hide 18 FeaturesShow 18 Features
Not enough data
Not enough data
Platform - Mobile Device Management (MDM)
Not enough data
Not enough data
Operating System
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Mobile Device Management (MDM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Absolute Secure Endpoint
Absolute Secure Endpoint
KACE Unified Endpoint Manager
KACE Unified Endpoint Manager
Absolute Secure Endpoint and KACE Unified Endpoint Manager are categorized as Unified Endpoint Management (UEM) and Endpoint Management
Unique Categories
Absolute Secure Endpoint
Absolute Secure Endpoint is categorized as Endpoint Protection Platforms
KACE Unified Endpoint Manager
KACE Unified Endpoint Manager is categorized as OS Imaging & Deployment and Mobile Device Management (MDM)
Reviews
Reviewers' Company Size
Absolute Secure Endpoint
Absolute Secure Endpoint
Small-Business(50 or fewer emp.)
11.6%
Mid-Market(51-1000 emp.)
49.9%
Enterprise(> 1000 emp.)
38.5%
KACE Unified Endpoint Manager
KACE Unified Endpoint Manager
Small-Business(50 or fewer emp.)
9.7%
Mid-Market(51-1000 emp.)
66.7%
Enterprise(> 1000 emp.)
23.7%
Reviewers' Industry
Absolute Secure Endpoint
Absolute Secure Endpoint
Information Technology and Services
12.8%
Hospital & Health Care
10.8%
Financial Services
8.8%
Computer & Network Security
4.3%
Computer Software
4.0%
Other
59.2%
KACE Unified Endpoint Manager
KACE Unified Endpoint Manager
Higher Education
18.3%
Education Management
11.8%
Government Administration
7.5%
Information Technology and Services
6.5%
Construction
5.4%
Other
50.5%
Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise...
Add Microsoft Intune Enterprise Application Management
ManageEngine Endpoint Central
ManageEngine Endpoint Central
Add ManageEngine Endpoint Central
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
KACE Unified Endpoint Manager
KACE Unified Endpoint Manager Alternatives
Ivanti Endpoint Manager
Ivanti Endpoint Manager
Add Ivanti Endpoint Manager
NinjaOne
NinjaOne
Add NinjaOne
ManageEngine Endpoint Central
ManageEngine Endpoint Central
Add ManageEngine Endpoint Central
SmartDeploy
SmartDeploy
Add SmartDeploy
Discussions
Absolute Secure Endpoint
Absolute Secure Endpoint Discussions
How do I uninstall Absolute Computrace software?
1 Comment
CR
The way to uninstall the Absolute Computrace Software is via the Absolute Console. You will search for the device you are wanting it uninstalled from and...Read more
What is absolute control?
1 Comment
AG
its a mobile device management solution addressing data and device security and remote managementRead more
Group Wiping of Devices
1 Comment
SG
Thank you posting your question and I apologize for the delayed response. We are glad you are utilizing our Wipe feature, as it is a powerful tool to...Read more
KACE Unified Endpoint Manager
KACE Unified Endpoint Manager Discussions
What are the benefits and drawbacks of using KACE Unified Endpoint Manager for IT asset management?
1 Comment
JS
- The knowledge curve is pretty big - You can Automate Daily TasksRead more
Monty the Mongoose crying
KACE Unified Endpoint Manager has no more discussions with answers