Compare Absolute Secure Endpoint and Lookout

Save your comparisonKeep these tools in one place and come back anytime.
Save to board
At a Glance
Absolute Secure Endpoint
Absolute Secure Endpoint
Star Rating
(408)4.6 out of 5
Market Segments
Mid-Market (49.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Absolute Secure Endpoint
Lookout
Lookout
Star Rating
(69)4.3 out of 5
Market Segments
Small-Business (43.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Lookout
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Absolute Secure Endpoint excels in providing robust device protection, with users highlighting its ability to maintain security even when key hardware components are replaced. This level of persistent protection is particularly valued in environments with high mobility.
  • Users say that Lookout offers comprehensive security for online privacy and data protection, making it a solid choice for those focused on overall device security. Reviewers appreciate its ability to monitor risky app behavior, which enhances their confidence in using the application.
  • According to verified reviews, Absolute Secure Endpoint has a higher overall satisfaction score, indicating that users feel more positively about their experience with the product. Many users note that the software has improved over time, with consistent updates and a focus on user feedback for future enhancements.
  • Reviewers mention that while Lookout is user-friendly, Absolute Secure Endpoint provides superior visibility over devices globally, which is crucial for organizations with remote workers. Users find it reassuring to know the exact locations of their devices, enhancing their management capabilities.
  • G2 reviewers highlight that Absolute Secure Endpoint has a more extensive user base, reflected in its significantly higher number of reviews. This suggests a more established presence in the market, which can be a deciding factor for buyers looking for a reliable solution.
  • Users report that while Lookout has a slightly better ease of use rating, Absolute Secure Endpoint's ease of administration is notably high, making it easier for IT teams to manage. This balance of usability and administrative efficiency is crucial for day-to-day operations.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
Lookout
No pricing available
Free Trial
Absolute Secure Endpoint
No trial information available
Lookout
No trial information available
Ratings
Meets Requirements
9.1
324
8.9
60
Ease of Use
8.7
327
8.8
61
Ease of Setup
8.8
276
8.9
18
Ease of Admin
8.8
295
9.7
18
Quality of Support
8.9
310
8.5
54
Has the product been a good partner in doing business?
9.3
288
9.6
15
Product Direction (% positive)
9.0
317
7.9
61
Features by Category
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
9.2
27
Not enough data
Scope
9.5
23
Not enough data
8.9
25
Not enough data
Security
9.1
27
Not enough data
9.2
25
Not enough data
9.4
25
Not enough data
Management
9.0
26
Not enough data
9.0
23
Not enough data
9.5
26
Not enough data
9.5
27
Not enough data
8.6
20
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.5
55
Not enough data
Administration
8.9
49
Not enough data
8.2
35
Not enough data
8.3
38
Not enough data
9.3
50
Not enough data
9.0
47
Not enough data
Functionality
8.9
42
Not enough data
7.4
33
Not enough data
8.6
41
Not enough data
7.3
32
Not enough data
Analysis
8.2
38
Not enough data
8.9
39
Not enough data
8.4
35
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.6
88
Not enough data
Generative AI
7.6
75
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Not enough data
9.0
8
Orchestration
Not enough data
8.6
6
Not enough data
9.3
7
Not enough data
8.8
7
Not enough data
8.1
6
Information
Not enough data
9.2
8
Not enough data
9.6
8
Not enough data
9.3
7
Personalization
Not enough data
9.6
8
Not enough data
8.8
8
Not enough data
8.3
8
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Threat Intelligence
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Absolute Secure Endpoint
Absolute Secure Endpoint
Lookout
Lookout
Absolute Secure Endpoint and Lookout share no categories
Unique Categories
Reviews
Reviewers' Company Size
Absolute Secure Endpoint
Absolute Secure Endpoint
Small-Business(50 or fewer emp.)
11.6%
Mid-Market(51-1000 emp.)
49.7%
Enterprise(> 1000 emp.)
38.7%
Lookout
Lookout
Small-Business(50 or fewer emp.)
43.3%
Mid-Market(51-1000 emp.)
17.9%
Enterprise(> 1000 emp.)
38.8%
Reviewers' Industry
Absolute Secure Endpoint
Absolute Secure Endpoint
Information Technology and Services
12.8%
Hospital & Health Care
10.8%
Financial Services
8.8%
Computer & Network Security
4.3%
Computer Software
4.3%
Other
59.0%
Lookout
Lookout
Information Technology and Services
13.4%
Computer Software
11.9%
Telecommunications
7.5%
Computer & Network Security
6.0%
Higher Education
4.5%
Other
56.7%
Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise...
Add Microsoft Intune Enterprise Application Management
ManageEngine Endpoint Central
ManageEngine Endpoint Central
Add ManageEngine Endpoint Central
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
Lookout
Lookout Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
ThreatDown
ThreatDown
Add ThreatDown
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Discussions
Absolute Secure Endpoint
Absolute Secure Endpoint Discussions
How do I uninstall Absolute Computrace software?
1 Comment
CR
The way to uninstall the Absolute Computrace Software is via the Absolute Console. You will search for the device you are wanting it uninstalled from and...Read more
What is absolute control?
1 Comment
AG
its a mobile device management solution addressing data and device security and remote managementRead more
Group Wiping of Devices
1 Comment
SG
Thank you posting your question and I apologize for the delayed response. We are glad you are utilizing our Wipe feature, as it is a powerful tool to...Read more
Lookout
Lookout Discussions
Monty the Mongoose crying
Lookout has no discussions with answers