G2 reviewers report that NinjaOne excels in user-friendliness, with many users highlighting its intuitive interface and ease of installation. One user mentioned, "Easy to use, easy to install on client endpoints," which contributes to a smoother onboarding experience compared to Absolute Secure Endpoint.
Users say that Absolute Secure Endpoint stands out for its robust device protection capabilities. Reviewers appreciate that even if critical hardware components are replaced, the device remains secure and manageable, showcasing its strength in maintaining security across various scenarios.
According to verified reviews, NinjaOne's feature set is frequently praised for its continuous improvements and additions. Users enjoy the ability to run scripts and PowerShell commands without needing to log onto endpoints, making daily tasks more efficient compared to Absolute Secure Endpoint.
Reviewers mention that while Absolute Secure Endpoint provides excellent visibility over devices globally, which is crucial for remote work, NinjaOne offers a more comprehensive reporting feature that simplifies generating usage reports for project meetings and client check-ins.
G2 reviewers highlight that NinjaOne's support quality is consistently rated highly, with users noting the responsiveness and helpfulness of the support team. In contrast, while Absolute Secure Endpoint also receives positive feedback for support, it does not match the level of satisfaction reported for NinjaOne.
Users express that Absolute Secure Endpoint has improved over time, with enhancements based on user feedback, but NinjaOne's rapid feature development and user-centric updates keep it ahead in terms of meeting evolving user needs and expectations.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
NinjaOne
No pricing available
Free Trial
Absolute Secure Endpoint
No trial information available
NinjaOne
Free Trial is available
Ratings
Meets Requirements
9.1
323
9.0
3,516
Ease of Use
8.7
326
9.1
3,553
Ease of Setup
8.8
275
9.1
3,331
Ease of Admin
8.8
295
9.1
3,056
Quality of Support
8.9
309
9.1
3,375
Has the product been a good partner in doing business?
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
What are the features that come with Absolute's different editions?
1 Comment
Official Response from Absolute Secure Endpoint
You can find the breakdown of which features are tied to the different editions of Absolute here: https://www.absolute.com/en/products/editions Read more
Do I need a WSUS Server to enable patch management on Windows devices?
6 Comments
JT
You can use WSUS to completely manage the distribution of Microsoft Update updates to https://basketballstars2.com computers on your network. Read more
How do I make a script to block all users on a PC from executive .MSI / .exe files?
2 Comments
PR
Make them regular users.
Do not make their accounts administrators.Read more
Do you provide the same level of functionality for MacOS as you do for Windows?
2 Comments
BA
Hey Sam,
We are an all Mac firm (as we work on Macs ourselves) and I can confirm they do support Macs well. Now, because of the Apple environment, they...Read more
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.