Compare Absolute Secure Endpoint and NinjaOne

At a Glance
Absolute Secure Endpoint
Absolute Secure Endpoint
Star Rating
(407)4.6 out of 5
Market Segments
Mid-Market (49.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Absolute Secure Endpoint
NinjaOne
NinjaOne
Star Rating
(3,704)4.7 out of 5
Market Segments
Mid-Market (49.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about NinjaOne
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that NinjaOne excels in user-friendliness, with many users highlighting its intuitive interface and ease of installation. One user mentioned, "Easy to use, easy to install on client endpoints," which contributes to a smoother onboarding experience compared to Absolute Secure Endpoint.
  • Users say that Absolute Secure Endpoint stands out for its robust device protection capabilities. Reviewers appreciate that even if critical hardware components are replaced, the device remains secure and manageable, showcasing its strength in maintaining security across various scenarios.
  • According to verified reviews, NinjaOne's feature set is frequently praised for its continuous improvements and additions. Users enjoy the ability to run scripts and PowerShell commands without needing to log onto endpoints, making daily tasks more efficient compared to Absolute Secure Endpoint.
  • Reviewers mention that while Absolute Secure Endpoint provides excellent visibility over devices globally, which is crucial for remote work, NinjaOne offers a more comprehensive reporting feature that simplifies generating usage reports for project meetings and client check-ins.
  • G2 reviewers highlight that NinjaOne's support quality is consistently rated highly, with users noting the responsiveness and helpfulness of the support team. In contrast, while Absolute Secure Endpoint also receives positive feedback for support, it does not match the level of satisfaction reported for NinjaOne.
  • Users express that Absolute Secure Endpoint has improved over time, with enhancements based on user feedback, but NinjaOne's rapid feature development and user-centric updates keep it ahead in terms of meeting evolving user needs and expectations.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
NinjaOne
No pricing available
Free Trial
Absolute Secure Endpoint
No trial information available
NinjaOne
Free Trial is available
Ratings
Meets Requirements
9.1
323
9.0
3,516
Ease of Use
8.7
326
9.1
3,553
Ease of Setup
8.8
275
9.1
3,331
Ease of Admin
8.8
295
9.1
3,056
Quality of Support
8.9
309
9.1
3,375
Has the product been a good partner in doing business?
9.3
288
9.4
2,989
Product Direction (% positive)
9.0
317
9.7
3,473
Features by Category
IT Service Management (ITSM) ToolsHide 22 FeaturesShow 22 Features
Not enough data
7.9
781
Administration
Not enough data
8.2
657
Not enough data
8.7
691
Not enough data
8.2
689
Service Desk
Not enough data
8.1
684
Not enough data
7.9
655
Not enough data
7.7
634
Management
Not enough data
8.3
622
Not enough data
9.0
629
Not enough data
8.7
605
Not enough data
8.8
607
Not enough data
8.4
585
Functionality
Not enough data
7.6
620
Not enough data
8.5
613
Not enough data
8.9
645
Not enough data
8.9
661
Agentic AI - IT Service Management (ITSM) Tools
Not enough data
6.9
173
Not enough data
6.8
171
Not enough data
6.9
169
Not enough data
6.7
170
Not enough data
6.7
169
Not enough data
6.7
167
Not enough data
6.8
166
Not enough data
8.1
362
Compatibility
Not enough data
8.8
331
Not enough data
8.1
291
Not enough data
8.3
301
Not enough data
8.2
279
Management
Not enough data
Feature Not Available
Not enough data
8.3
290
Not enough data
8.6
291
Not enough data
8.8
320
Not enough data
9.2
328
Compliance
Not enough data
8.7
291
Not enough data
8.4
278
Not enough data
Feature Not Available
Agentic AI - Server Backup
Not enough data
7.3
65
Not enough data
7.2
63
Not enough data
7.6
64
Not enough data
7.4
63
Not enough data
7.2
63
Not enough data
7.4
64
Not enough data
8.1
409
Functionality
Not enough data
Feature Not Available
Not enough data
8.7
339
Not enough data
9.0
366
Not enough data
8.5
345
Not enough data
Feature Not Available
Compatibility
Not enough data
8.8
350
Not enough data
8.6
342
Not enough data
8.3
327
Management
Not enough data
8.2
327
Not enough data
8.8
330
Not enough data
8.7
331
Agentic AI - Online Backup
Not enough data
7.6
75
Not enough data
7.3
72
Not enough data
7.3
73
Not enough data
7.3
71
Not enough data
7.4
72
Not enough data
7.3
72
Remote Monitoring & Management (RMM)Hide 19 FeaturesShow 19 Features
Not enough data
8.0
2,361
Inventory Management - Remote Monitoring & Management (RMM)
Not enough data
9.3
2165
|
Verified
Not enough data
8.7
566
Not enough data
8.1
449
Monitoring and Management
Not enough data
9.3
2142
|
Verified
Not enough data
8.4
1869
Not enough data
8.7
1986
|
Verified
Not enough data
9.0
2168
|
Verified
Not enough data
8.3
476
IT Operations & Workflow - Remote Monitoring & Management (RMM)
Not enough data
8.5
469
Service Management
Not enough data
9.2
2075
|
Verified
Not enough data
8.1
451
Not enough data
7.3
484
Agentic AI - Remote Monitoring & Management (RMM)
Not enough data
7.3
480
Not enough data
7.0
462
Not enough data
7.2
464
Not enough data
6.9
453
Not enough data
6.8
453
Not enough data
6.9
454
Not enough data
7.0
450
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
9.1
26
7.9
451
Scope
9.5
22
8.7
413
8.8
24
8.8
428
Security
9.0
26
8.5
422
9.2
24
8.3
389
9.4
24
7.4
381
Management
8.9
25
8.8
411
9.0
23
8.7
409
9.5
25
8.7
398
9.5
26
8.7
400
8.6
20
7.8
371
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
7.3
168
Not enough data
7.1
167
Not enough data
7.3
167
Not enough data
7.1
164
Not enough data
7.0
164
Not enough data
7.2
166
Not enough data
7.1
167
Not enough data
7.5
729
Functionality
Not enough data
8.8
670
Not enough data
8.9
697
Not enough data
8.0
614
Not enough data
8.8
609
Monitoring - Network Monitoring
Not enough data
7.5
247
Not enough data
7.8
250
Not enough data
8.3
262
Management
Not enough data
8.2
569
Not enough data
8.2
583
Not enough data
7.6
536
Analytics - Network Monitoring
Not enough data
7.0
238
Not enough data
6.9
236
Security - Network Monitoring
Not enough data
7.7
241
Not enough data
7.2
238
Not enough data
7.1
238
Network Performance - Network Monitoring
Not enough data
6.9
239
Not enough data
7.4
243
AI Automation - Network Monitoring
Not enough data
6.4
228
Not enough data
6.3
228
Not enough data
6.4
227
Agentic AI - Network Monitoring
Not enough data
6.6
124
Not enough data
6.5
122
Not enough data
6.7
125
Not enough data
6.6
121
Not enough data
6.4
120
Not enough data
6.6
121
Not enough data
6.4
122
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.5
54
Not enough data
Administration
8.9
48
Not enough data
8.2
35
Not enough data
8.3
38
Not enough data
9.3
50
Not enough data
9.0
47
Not enough data
Functionality
8.9
42
Not enough data
7.4
33
Not enough data
8.6
41
Not enough data
7.3
32
Not enough data
Analysis
8.2
38
Not enough data
8.9
39
Not enough data
8.4
35
Not enough data
Not enough data
8.0
591
Monitoring
Not enough data
9.3
560
|
Verified
Not enough data
9.2
557
|
Verified
Not enough data
8.5
506
|
Verified
Not enough data
7.1
197
Management Tools
Not enough data
8.2
497
Not enough data
8.6
507
|
Verified
Not enough data
8.5
487
|
Verified
Generative AI
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Agentic AI - Incident Management
Not enough data
7.5
95
Not enough data
7.4
94
Not enough data
7.7
93
Not enough data
7.2
93
Not enough data
7.2
93
Not enough data
7.3
92
Not enough data
7.5
91
Not enough data
7.9
1,225
Asset Inventory
Not enough data
9.0
1153
Not enough data
8.8
1139
Not enough data
7.7
1019
Not enough data
Feature Not Available
Not enough data
8.2
1055
Generative AI
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Agentic AI - IT Asset Management
Not enough data
7.4
228
Not enough data
7.2
223
Not enough data
7.4
220
Not enough data
7.1
217
Not enough data
7.1
216
Not enough data
7.1
221
Not enough data
7.0
218
Management
Not enough data
9.1
1116
Not enough data
8.7
1038
Not enough data
8.1
996
Not enough data
8.2
1048
Not enough data
8.4
1,799
Administration
Not enough data
9.2
1629
Not enough data
8.7
1554
Not enough data
7.8
1416
Not enough data
9.2
1634
Not enough data
8.9
1497
Not enough data
8.8
1546
Maintenance
Not enough data
9.2
1620
Not enough data
7.7
1326
Communication
Not enough data
7.9
1396
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
7.2
1300
Security
Not enough data
8.3
1345
Not enough data
8.4
1377
Device Support
Not enough data
7.6
1352
Not enough data
8.4
1429
Not enough data
8.4
1412
Performance
Not enough data
8.2
1500
Not enough data
7.9
344
Functionality
Not enough data
8.8
324
Not enough data
7.9
291
Not enough data
8.1
296
Not enough data
8.6
313
Performance
Not enough data
8.7
317
Not enough data
8.5
302
Not enough data
Feature Not Available
Not enough data
8.6
304
Agentic AI - PC Backup
Not enough data
7.1
88
Not enough data
7.1
88
Not enough data
6.9
87
Not enough data
7.0
87
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.6
88
Not enough data
Generative AI
7.6
75
Feature Not Available
Not enough data
8.5
238
Management and Discovery - IT Documentation
Not enough data
8.3
221
Not enough data
8.3
219
Not enough data
8.7
221
Operations - IT Documentation
Not enough data
8.4
221
Not enough data
8.8
228
Not enough data
8.4
223
Autonomous Endpoint Management (AEM)Hide 7 FeaturesShow 7 Features
Not enough data
7.8
96
Generative AI - Autonomous Endpoint Management
Not enough data
7.0
64
Not enough data
7.2
65
Not enough data
7.1
63
Monitoring and Management - Autonomous Endpoint Management
Not enough data
8.7
92
Not enough data
8.1
72
Not enough data
7.8
67
Not enough data
8.8
83
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Device Management (MDM)Hide 18 FeaturesShow 18 Features
Not enough data
8.1
547
Platform - Mobile Device Management (MDM)
Not enough data
8.5
442
Operating System
Not enough data
9.2
528
Not enough data
8.1
502
Not enough data
8.3
478
Management
Not enough data
8.6
486
Not enough data
8.2
448
Not enough data
8.2
445
Not enough data
8.1
437
Not enough data
8.3
449
Security
Not enough data
8.5
457
Not enough data
8.6
465
Agentic AI - Mobile Device Management (MDM)
Not enough data
7.7
143
Not enough data
7.6
140
Not enough data
7.8
142
Not enough data
7.7
139
Not enough data
7.6
137
Not enough data
7.6
139
Not enough data
7.6
136
Not enough data
Not enough data
Knowledge Base
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Content
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Communication
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enterprise IT ManagementHide 18 FeaturesShow 18 Features
Not enough data
7.9
857
Analysis
Not enough data
8.1
727
Platform
Not enough data
7.8
699
Not enough data
9.1
785
Not enough data
8.2
680
Not enough data
8.5
737
Not enough data
8.3
707
Security
Not enough data
8.7
741
Not enough data
9.2
812
Not enough data
7.6
673
Not enough data
8.7
711
Not enough data
8.2
681
Agentic AI - Enterprise IT Management
Not enough data
7.4
163
Not enough data
7.2
153
Not enough data
7.3
156
Not enough data
7.0
152
Not enough data
7.0
151
Not enough data
6.9
151
Not enough data
7.0
150
Reviews
Reviewers' Company Size
Absolute Secure Endpoint
Absolute Secure Endpoint
Small-Business(50 or fewer emp.)
11.6%
Mid-Market(51-1000 emp.)
49.9%
Enterprise(> 1000 emp.)
38.5%
NinjaOne
NinjaOne
Small-Business(50 or fewer emp.)
43.4%
Mid-Market(51-1000 emp.)
49.7%
Enterprise(> 1000 emp.)
6.9%
Reviewers' Industry
Absolute Secure Endpoint
Absolute Secure Endpoint
Information Technology and Services
12.8%
Hospital & Health Care
10.8%
Financial Services
8.8%
Computer & Network Security
4.3%
Computer Software
4.0%
Other
59.2%
NinjaOne
NinjaOne
Information Technology and Services
26.7%
Computer & Network Security
13.0%
Hospital & Health Care
4.0%
Manufacturing
3.7%
Computer Software
2.9%
Other
49.6%
Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise...
Add Microsoft Intune Enterprise Application Management
ManageEngine Endpoint Central
ManageEngine Endpoint Central
Add ManageEngine Endpoint Central
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
NinjaOne
NinjaOne Alternatives
Atera
Atera
Add Atera
TeamViewer
TeamViewer
Add TeamViewer
N-able N-central
N-able N-central
Add N-able N-central
LogMeIn Resolve
LogMeIn Resolve
Add LogMeIn Resolve
Discussions
Absolute Secure Endpoint
Absolute Secure Endpoint Discussions
What is Absolute's Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
What are the features that come with Absolute's different editions?
1 Comment
Official Response from Absolute Secure Endpoint
You can find the breakdown of which features are tied to the different editions of Absolute here: https://www.absolute.com/en/products/editions Read more
NinjaOne
NinjaOne Discussions
Do I need a WSUS Server to enable patch management on Windows devices?
6 Comments
Jenny T.
JT
You can use WSUS to completely manage the distribution of Microsoft Update updates to https://basketballstars2.com computers on your network. Read more
How do I make a script to block all users on a PC from executive .MSI / .exe files?
2 Comments
Pani R.
PR
Make them regular users. Do not make their accounts administrators.Read more
Do you provide the same level of functionality for MacOS as you do for Windows?
2 Comments
Brian A.
BA
Hey Sam, We are an all Mac firm (as we work on Macs ourselves) and I can confirm they do support Macs well. Now, because of the Apple environment, they...Read more