Introducing G2.ai, the future of software buying.Try now

Compare Absolute Secure Endpoint and Prey

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Absolute Secure Endpoint
Absolute Secure Endpoint
Star Rating
(407)4.6 out of 5
Market Segments
Mid-Market (50.0% of reviews)
Information
Entry-Level Pricing
No pricing available
Learn more about Absolute Secure Endpoint
Prey
Prey
Star Rating
(51)4.7 out of 5
Market Segments
Small-Business (60.4% of reviews)
Information
Entry-Level Pricing
$1.30 1 device slot per month/ billed yearly
Browse all 3 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Absolute Secure Endpoint excels in Quality of Support with a score of 9.0, while Prey shines with an impressive 9.7, indicating that users find Prey's support more responsive and helpful.
  • Reviewers mention that Absolute Secure Endpoint has a robust Asset Management feature with a score of 9.3, which includes comprehensive hardware asset inventory capabilities, whereas Prey, with a score of 8.8, offers slightly less depth in this area.
  • G2 users highlight that Prey offers superior Ease of Setup with a score of 9.5 compared to Absolute Secure Endpoint's 8.9, suggesting that users find Prey easier to implement and get started with.
  • Users on G2 report that Absolute Secure Endpoint's Endpoint Protection is rated highly at 9.3, but Prey also performs well with a score of 8.3, indicating that while both products provide solid protection, Absolute Secure Endpoint may offer more comprehensive features.
  • Reviewers say that Absolute Secure Endpoint's Compliance features, particularly in Multi-Factor Authentication, score 9.2, which is on par with Prey's 9.0, showing that both products are strong in this critical area for security.
  • Users report that Absolute Secure Endpoint's System Isolation feature is rated at 9.0, while Prey falls behind with a score of 7.9, indicating that Absolute Secure Endpoint may provide better options for isolating systems in case of a security breach.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
Prey
Prey Tracking
$1.30
1 device slot per month/ billed yearly
Browse all 3 pricing plans
Free Trial
Absolute Secure Endpoint
No trial information available
Prey
Free Trial is available
Ratings
Meets Requirements
9.1
322
9.0
42
Ease of Use
8.7
325
9.2
46
Ease of Setup
8.8
274
9.5
33
Ease of Admin
8.8
294
9.4
31
Quality of Support
9.0
308
9.7
38
Has the product been a good partner in doing business?
9.3
287
9.6
31
Product Direction (% positive)
9.0
317
8.6
42
Features by Category
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
9.1
25
Not enough data
Scope
9.5
21
Not enough data
8.8
23
Not enough data
Security
9.1
25
Not enough data
9.2
23
Not enough data
9.3
23
Not enough data
Management
8.9
24
Not enough data
8.9
22
Not enough data
9.6
24
Not enough data
9.5
25
Not enough data
8.5
19
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.5
53
Not enough data
Administration
9.0
47
Not enough data
8.2
34
Not enough data
8.2
37
Not enough data
9.3
49
Not enough data
9.1
46
Not enough data
Functionality
8.9
41
Not enough data
7.6
32
Not enough data
8.8
40
Not enough data
7.5
31
Not enough data
Analysis
8.2
38
Not enough data
8.9
39
Not enough data
8.4
35
Not enough data
Not enough data
7.3
16
Asset Inventory
Not enough data
9.4
16
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Generative AI
Not enough data
5.7
7
Not enough data
5.7
7
Agentic AI - IT Asset Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
9.4
13
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
6.4
12
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.6
88
7.4
7
Generative AI
7.6
75
7.4
7
Mobile Data SecurityHide 9 FeaturesShow 9 Features
Not enough data
7.7
7
Compliance
Not enough data
9.3
7
Not enough data
9.3
7
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Protection
Not enough data
7.6
7
Not enough data
7.4
7
Not enough data
6.2
7
Not enough data
6.2
7
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Device Management (MDM)Hide 18 FeaturesShow 18 Features
Not enough data
9.2
19
Platform - Mobile Device Management (MDM)
Not enough data
Feature Not Available
Operating System
Not enough data
9.4
19
Not enough data
8.8
17
Not enough data
9.5
16
Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.8
17
Security
Not enough data
9.7
19
Not enough data
9.1
18
Agentic AI - Mobile Device Management (MDM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Absolute Secure Endpoint
Absolute Secure Endpoint
Prey
Prey
Absolute Secure Endpoint and Prey are categorized as Endpoint Management
Unique Categories
Absolute Secure Endpoint
Absolute Secure Endpoint is categorized as Unified Endpoint Management (UEM) and Endpoint Protection Platforms
Reviews
Reviewers' Company Size
Absolute Secure Endpoint
Absolute Secure Endpoint
Small-Business(50 or fewer emp.)
11.6%
Mid-Market(51-1000 emp.)
50.0%
Enterprise(> 1000 emp.)
38.4%
Prey
Prey
Small-Business(50 or fewer emp.)
60.4%
Mid-Market(51-1000 emp.)
35.4%
Enterprise(> 1000 emp.)
4.2%
Reviewers' Industry
Absolute Secure Endpoint
Absolute Secure Endpoint
Information Technology and Services
12.9%
Hospital & Health Care
10.9%
Financial Services
8.8%
Computer & Network Security
4.3%
Primary/Secondary Education
4.0%
Other
59.1%
Prey
Prey
Information Technology and Services
18.8%
Consulting
6.3%
Higher Education
6.3%
Computer Software
6.3%
Computer & Network Security
6.3%
Other
56.3%
Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise Application Management
Add Microsoft Intune Enterprise Application Management
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Add Symantec End-user Endpoint Security
SentinelOne Singularity
SentinelOne
Add SentinelOne Singularity
Prey
Prey Alternatives
NinjaOne
NinjaOne
Add NinjaOne
Rippling
Rippling
Add Rippling
Iru
Iru
Add Iru
Jamf
Jamf
Add Jamf
Discussions
Absolute Secure Endpoint
Absolute Secure Endpoint Discussions
Is there a way to exclude executables from the full list?
1 Comment
Official Response from Absolute Secure Endpoint
Thanks for your comment, James. The ability to filter executables shown in application reports is part of our product roadmap and will be made available...Read more
What is Absolute's Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
Prey
Prey Discussions
Monty the Mongoose crying
Prey has no discussions with answers