Introducing G2.ai, the future of software buying.Try now

Compare Absolute Secure Endpoint and Prey

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Absolute Secure Endpoint
Absolute Secure Endpoint
Star Rating
(407)4.6 out of 5
Market Segments
Mid-Market (49.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Absolute Secure Endpoint
Prey
Prey
Star Rating
(55)4.7 out of 5
Market Segments
Small-Business (55.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$1.30 1 device slot per month/ billed yearly
Browse all 3 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Absolute Secure Endpoint excels in providing robust device protection, with users highlighting its ability to maintain security even when key hardware components are replaced. This level of persistent protection is particularly valued in environments with high mobility.
  • Users say that Prey offers a user-friendly experience, with many praising its simple installation process and intuitive interface. Reviewers appreciate how easy it is to track devices, making it a practical choice for small businesses looking for straightforward solutions.
  • According to verified reviews, Absolute Secure Endpoint stands out for its comprehensive visibility features, allowing users to monitor device locations globally. This capability is crucial for organizations with remote workers, ensuring that devices are always accounted for.
  • Reviewers mention that Prey has made significant improvements in its search capabilities, enabling efficient device tracking and management. Users particularly like the tagging feature that allows them to organize devices by department, enhancing overall workflow.
  • G2 reviewers highlight that while Absolute Secure Endpoint has a solid reputation for quality support, Prey outshines it in this area, with users consistently rating its customer service as exceptional. This can be a deciding factor for businesses that prioritize responsive support.
  • Users report that Absolute Secure Endpoint has improved over time, with ongoing updates and user feedback shaping its development. In contrast, while Prey is effective, some users feel it may not evolve as rapidly, which could impact long-term satisfaction.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
Prey
Prey Tracking
$1.30
1 device slot per month/ billed yearly
Browse all 3 pricing plans
Free Trial
Absolute Secure Endpoint
No trial information available
Prey
Free Trial is available
Ratings
Meets Requirements
9.1
323
9.1
46
Ease of Use
8.7
326
9.2
50
Ease of Setup
8.8
275
9.5
37
Ease of Admin
8.8
295
9.4
34
Quality of Support
8.9
309
9.7
42
Has the product been a good partner in doing business?
9.3
288
9.6
34
Product Direction (% positive)
9.0
317
8.7
46
Features by Category
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
9.1
26
Not enough data
Scope
9.5
22
Not enough data
8.8
24
Not enough data
Security
9.0
26
Not enough data
9.2
24
Not enough data
9.4
24
Not enough data
Management
8.9
25
Not enough data
9.0
23
Not enough data
9.5
25
Not enough data
9.5
26
Not enough data
8.6
20
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.5
54
Not enough data
Administration
8.9
48
Not enough data
8.2
35
Not enough data
8.3
38
Not enough data
9.3
50
Not enough data
9.0
47
Not enough data
Functionality
8.9
42
Not enough data
7.4
33
Not enough data
8.6
41
Not enough data
7.3
32
Not enough data
Analysis
8.2
38
Not enough data
8.9
39
Not enough data
8.4
35
Not enough data
Not enough data
7.6
18
Asset Inventory
Not enough data
9.5
19
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Generative AI
Not enough data
6.3
8
Not enough data
6.3
8
Agentic AI - IT Asset Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
9.4
15
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
6.4
13
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.6
88
7.4
7
Generative AI
7.6
75
7.4
7
Mobile Data SecurityHide 9 FeaturesShow 9 Features
Not enough data
7.9
8
Compliance
Not enough data
9.3
7
Not enough data
9.4
8
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Protection
Not enough data
7.9
8
Not enough data
7.7
8
Not enough data
6.2
7
Not enough data
7.1
8
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Device Management (MDM)Hide 18 FeaturesShow 18 Features
Not enough data
9.3
22
Platform - Mobile Device Management (MDM)
Not enough data
Feature Not Available
Operating System
Not enough data
9.4
20
Not enough data
9.1
19
Not enough data
9.5
17
Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
9.0
20
Security
Not enough data
9.8
22
Not enough data
9.2
20
Agentic AI - Mobile Device Management (MDM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Absolute Secure Endpoint
Absolute Secure Endpoint
Prey
Prey
Absolute Secure Endpoint and Prey are categorized as Endpoint Management
Unique Categories
Absolute Secure Endpoint
Absolute Secure Endpoint is categorized as Unified Endpoint Management (UEM) and Endpoint Protection Platforms
Reviews
Reviewers' Company Size
Absolute Secure Endpoint
Absolute Secure Endpoint
Small-Business(50 or fewer emp.)
11.6%
Mid-Market(51-1000 emp.)
49.9%
Enterprise(> 1000 emp.)
38.5%
Prey
Prey
Small-Business(50 or fewer emp.)
55.8%
Mid-Market(51-1000 emp.)
38.5%
Enterprise(> 1000 emp.)
5.8%
Reviewers' Industry
Absolute Secure Endpoint
Absolute Secure Endpoint
Information Technology and Services
12.8%
Hospital & Health Care
10.8%
Financial Services
8.8%
Computer & Network Security
4.3%
Primary/Secondary Education
4.0%
Other
59.2%
Prey
Prey
Information Technology and Services
19.2%
Consulting
5.8%
Higher Education
5.8%
Computer Software
5.8%
Computer & Network Security
5.8%
Other
57.7%
Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise Application Management
Add Microsoft Intune Enterprise Application Management
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Add Symantec End-user Endpoint Security
Prey
Prey Alternatives
NinjaOne
NinjaOne
Add NinjaOne
Iru
Iru
Add Iru
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Jamf
Jamf
Add Jamf
Discussions
Absolute Secure Endpoint
Absolute Secure Endpoint Discussions
Is there a way to exclude executables from the full list?
1 Comment
Official Response from Absolute Secure Endpoint
Thanks for your comment, James. The ability to filter executables shown in application reports is part of our product roadmap and will be made available...Read more
What is Absolute's Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
Prey
Prey Discussions
Monty the Mongoose crying
Prey has no discussions with answers