Compare Absolute Secure Endpoint and Microsoft System Center

At a Glance
Absolute Secure Endpoint
Absolute Secure Endpoint
Star Rating
(407)4.6 out of 5
Market Segments
Mid-Market (49.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Absolute Secure Endpoint
Microsoft System Center
Microsoft System Center
Star Rating
(585)4.1 out of 5
Market Segments
Enterprise (46.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Microsoft System Center
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Absolute Secure Endpoint excels in device protection, with users highlighting its ability to maintain security even when key hardware components are replaced. This level of persistent protection is particularly valued in environments with remote users.
  • Users say that Absolute Secure Endpoint offers a more intuitive user experience, reflected in its higher ratings for ease of use and setup. Reviewers appreciate the comprehensive visibility it provides over devices, which is crucial for managing a distributed workforce.
  • According to verified reviews, Microsoft System Center is praised for its efficiency in managing updates across multiple locations. Users find it beneficial for quickly deploying machines with pre-configured images, which streamlines operations in retail environments.
  • Reviewers mention that while Microsoft System Center has strong capabilities, some users have faced challenges with usability, particularly in recent experiences. Complaints about difficulty in writing and general ease of use suggest that it may not meet the needs of all users effectively.
  • G2 reviewers highlight that Absolute Secure Endpoint has shown consistent improvement over time, with users noting that the company actively seeks feedback to enhance its features. This responsiveness contributes to a positive perception of its product direction.
  • Users report that while Microsoft System Center is widely used in enterprise settings, its complexity can be a barrier for some, especially those not familiar with ITIL frameworks. This complexity may lead to a steeper learning curve compared to the more user-friendly Absolute Secure Endpoint.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
Microsoft System Center
No pricing available
Free Trial
Absolute Secure Endpoint
No trial information available
Microsoft System Center
No trial information available
Ratings
Meets Requirements
9.1
323
8.6
478
Ease of Use
8.7
326
7.7
477
Ease of Setup
8.8
275
7.0
320
Ease of Admin
8.8
295
7.9
323
Quality of Support
8.9
309
8.0
444
Has the product been a good partner in doing business?
9.3
288
8.1
298
Product Direction (% positive)
9.0
317
7.4
461
Features by Category
IT Service Management (ITSM) ToolsHide 22 FeaturesShow 22 Features
Not enough data
8.5
83
Administration
Not enough data
8.7
62
|
Verified
Not enough data
8.6
63
|
Verified
Not enough data
8.7
65
|
Verified
Service Desk
Not enough data
8.7
58
|
Verified
Not enough data
8.5
59
|
Verified
Not enough data
8.3
59
|
Verified
Management
Not enough data
8.9
16
|
Verified
Not enough data
8.5
16
|
Verified
Not enough data
8.6
13
|
Verified
Not enough data
8.7
13
|
Verified
Not enough data
8.3
13
Functionality
Not enough data
8.6
13
|
Verified
Not enough data
8.5
14
Not enough data
9.0
16
|
Verified
Not enough data
8.8
15
|
Verified
Agentic AI - IT Service Management (ITSM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
9.1
26
Not enough data
Scope
9.5
22
Not enough data
8.8
24
Not enough data
Security
9.0
26
Not enough data
9.2
24
Not enough data
9.4
24
Not enough data
Management
8.9
25
Not enough data
9.0
23
Not enough data
9.5
25
Not enough data
9.5
26
Not enough data
8.6
20
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.5
54
Not enough data
Administration
8.9
48
Not enough data
8.2
35
Not enough data
8.3
38
Not enough data
9.3
50
Not enough data
9.0
47
Not enough data
Functionality
8.9
42
Not enough data
7.4
33
Not enough data
8.6
41
Not enough data
7.3
32
Not enough data
Analysis
8.2
38
Not enough data
8.9
39
Not enough data
8.4
35
Not enough data
Data Center Infrastructure Management (DCIM)Hide 6 FeaturesShow 6 Features
Not enough data
8.7
8
Performance Management
Not enough data
9.4
8
Not enough data
8.6
6
Not enough data
9.2
8
Monitoring
Not enough data
8.8
8
Not enough data
8.3
7
Not enough data
8.1
6
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.6
88
Not enough data
Generative AI
7.6
75
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enterprise IT ManagementHide 18 FeaturesShow 18 Features
Not enough data
8.7
17
Analysis
Not enough data
8.6
12
Platform
Not enough data
9.0
8
Not enough data
8.8
13
Not enough data
9.2
6
Not enough data
8.3
13
Not enough data
8.3
10
Security
Not enough data
8.6
14
Not enough data
9.0
14
Not enough data
8.3
8
Not enough data
9.3
7
Not enough data
9.1
9
Agentic AI - Enterprise IT Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Absolute Secure Endpoint
Absolute Secure Endpoint
Microsoft System Center
Microsoft System Center
Absolute Secure Endpoint and Microsoft System Center are categorized as Endpoint Management
Reviews
Reviewers' Company Size
Absolute Secure Endpoint
Absolute Secure Endpoint
Small-Business(50 or fewer emp.)
11.6%
Mid-Market(51-1000 emp.)
49.9%
Enterprise(> 1000 emp.)
38.5%
Microsoft System Center
Microsoft System Center
Small-Business(50 or fewer emp.)
20.6%
Mid-Market(51-1000 emp.)
33.4%
Enterprise(> 1000 emp.)
46.1%
Reviewers' Industry
Absolute Secure Endpoint
Absolute Secure Endpoint
Information Technology and Services
12.8%
Hospital & Health Care
10.8%
Financial Services
8.8%
Computer & Network Security
4.3%
Computer Software
4.0%
Other
59.2%
Microsoft System Center
Microsoft System Center
Information Technology and Services
19.1%
Education Management
6.2%
Government Administration
5.5%
Computer Software
5.1%
Hospital & Health Care
3.9%
Other
60.2%
Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise...
Add Microsoft Intune Enterprise Application Management
ManageEngine Endpoint Central
ManageEngine Endpoint Central
Add ManageEngine Endpoint Central
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
Microsoft System Center
Microsoft System Center Alternatives
NinjaOne
NinjaOne
Add NinjaOne
ManageEngine Endpoint Central
ManageEngine Endpoint Central
Add ManageEngine Endpoint Central
Atera
Atera
Add Atera
Red Hat Ansible Automation Platform
Red Hat Ansible Automation...
Add Red Hat Ansible Automation Platform
Discussions
Absolute Secure Endpoint
Absolute Secure Endpoint Discussions
What is Absolute's Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
What are the features that come with Absolute's different editions?
1 Comment
Official Response from Absolute Secure Endpoint
You can find the breakdown of which features are tied to the different editions of Absolute here: https://www.absolute.com/en/products/editions Read more
Microsoft System Center
Microsoft System Center Discussions
What does Microsoft System Center do?
2 Comments
Satyajit C.
SC
Microsoft System Center is a suite of management tools for IT infrastructure. Components include SCCM for software deployment, SCOM for monitoring, VMM for...Read more
Backup process is too costly?
1 Comment
Amit D.
AD
Monty the Mongoose crying
Microsoft System Center has no more discussions with answers