G2 reviewers report that Absolute Secure Endpoint excels in providing robust device protection, with users highlighting its ability to maintain security even when key hardware components are replaced. This level of persistent protection is particularly valued in environments with high mobility.
Users say that Prey offers a user-friendly experience, with many praising its simple installation process and intuitive interface. Reviewers appreciate how easy it is to track devices, making it a practical choice for small businesses looking for straightforward solutions.
According to verified reviews, Absolute Secure Endpoint stands out for its comprehensive visibility features, allowing users to monitor device locations globally. This capability is crucial for organizations with remote workers, ensuring that devices are always accounted for.
Reviewers mention that Prey has made significant improvements in its search capabilities, enabling efficient device tracking and management. Users particularly like the tagging feature that allows them to organize devices by department, enhancing overall workflow.
G2 reviewers highlight that while Absolute Secure Endpoint has a solid reputation for quality support, Prey outshines it in this area, with users consistently rating its customer service as exceptional. This can be a deciding factor for businesses that prioritize responsive support.
Users report that Absolute Secure Endpoint has improved over time, with ongoing updates and user feedback shaping its development. In contrast, while Prey is effective, some users feel it may not evolve as rapidly, which could impact long-term satisfaction.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
Prey
Prey Tracking
$1.30
1 device slot per month/ billed yearly
Monitor your organization's complete fleet with always-on tracking and more:
Is there a way to exclude executables from the full list?
1 Comment
Official Response from Absolute Secure Endpoint
Thanks for your comment, James. The ability to filter executables shown in application reports is part of our product roadmap and will be made available...Read more
What is Absolute's Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.