Introducing G2.ai, the future of software buying.Try now

Compare Absolute Secure Endpoint and ThreatDown

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Absolute Secure Endpoint
Absolute Secure Endpoint
Star Rating
(407)4.6 out of 5
Market Segments
Mid-Market (49.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Absolute Secure Endpoint
ThreatDown
ThreatDown
Star Rating
(1,064)4.6 out of 5
Market Segments
Small-Business (47.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial 1 Device Per Year
Free Trial is available
Browse all 3 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that ThreatDown excels in ease of use with a score of 9.3, making it highly accessible for small businesses. In contrast, Absolute Secure Endpoint, with a score of 8.6, is noted for being more complex, which may require additional training for users.
  • Reviewers mention that ThreatDown's malware detection capabilities are outstanding, scoring 9.6, which is significantly higher than Absolute Secure Endpoint's score of 7.6. Users appreciate the proactive measures ThreatDown takes to identify and neutralize threats effectively.
  • G2 users highlight that ThreatDown offers a free trial, allowing potential customers to test the software before committing. Absolute Secure Endpoint does not provide a similar entry-level pricing option, which may deter some small businesses from exploring its features.
  • Reviewers say that ThreatDown shines in automated remediation with a score of 9.0, enabling quick responses to security incidents. In comparison, Absolute Secure Endpoint's score of 8.1 indicates it may not be as efficient in this critical area.
  • Users on G2 report that while both products have strong compliance scores (ThreatDown at 9.1 and Absolute Secure Endpoint at 9.0), ThreatDown is often praised for its user-friendly compliance reporting features, which simplify the process for small businesses.
  • Reviewers mention that ThreatDown's asset management capabilities are rated lower at 8.5 compared to Absolute Secure Endpoint's impressive 9.4. Users appreciate Absolute Secure Endpoint's robust asset tracking features, which are essential for mid-market companies managing larger inventories.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
ThreatDown
Endpoint Protection - 14 Day Trial
Free Trial
1 Device Per Year
Browse all 3 pricing plans
Free Trial
Absolute Secure Endpoint
No trial information available
ThreatDown
Free Trial is available
Ratings
Meets Requirements
9.1
323
9.2
956
Ease of Use
8.7
326
9.3
961
Ease of Setup
8.8
275
9.2
723
Ease of Admin
8.8
295
9.1
694
Quality of Support
8.9
309
8.8
853
Has the product been a good partner in doing business?
9.3
288
9.1
673
Product Direction (% positive)
9.0
317
8.9
946
Features by Category
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
9.1
26
Not enough data
Scope
9.5
22
Not enough data
8.8
24
Not enough data
Security
9.0
26
Not enough data
9.2
24
Not enough data
9.4
24
Not enough data
Management
8.9
25
Not enough data
9.0
23
Not enough data
9.5
25
Not enough data
9.5
26
Not enough data
8.6
20
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.5
54
8.9
282
Administration
8.9
48
9.1
228
8.2
35
8.8
235
8.3
38
8.9
219
9.3
50
8.5
202
9.0
47
8.8
221
Functionality
8.9
42
8.9
211
7.4
33
8.9
211
8.6
41
9.0
243
7.3
32
9.6
256
Analysis
8.2
38
9.0
230
8.9
39
8.9
237
8.4
35
8.8
220
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
8.7
122
Platform Features
Not enough data
9.1
119
Not enough data
9.1
119
Not enough data
8.9
116
Not enough data
9.1
119
Not enough data
9.3
120
Not enough data
8.6
118
Not enough data
9.2
6
Automation Capabilities
Not enough data
9.1
118
Not enough data
9.1
119
Not enough data
5.3
5
Not enough data
6.9
169
Generative AI
Not enough data
6.8
168
Not enough data
6.9
154
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.6
88
7.4
114
Generative AI
7.6
75
7.4
114
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.7
12
Services - Endpoint Detection & Response (EDR)
Not enough data
9.7
12
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Absolute Secure Endpoint
Absolute Secure Endpoint
ThreatDown
ThreatDown
Absolute Secure Endpoint and ThreatDown are categorized as Endpoint Protection Platforms and Endpoint Management
Unique Categories
Absolute Secure Endpoint
Absolute Secure Endpoint is categorized as Unified Endpoint Management (UEM)
Reviews
Reviewers' Company Size
Absolute Secure Endpoint
Absolute Secure Endpoint
Small-Business(50 or fewer emp.)
11.6%
Mid-Market(51-1000 emp.)
49.9%
Enterprise(> 1000 emp.)
38.5%
ThreatDown
ThreatDown
Small-Business(50 or fewer emp.)
47.1%
Mid-Market(51-1000 emp.)
40.9%
Enterprise(> 1000 emp.)
11.9%
Reviewers' Industry
Absolute Secure Endpoint
Absolute Secure Endpoint
Information Technology and Services
12.8%
Hospital & Health Care
10.8%
Financial Services
8.8%
Computer & Network Security
4.3%
Primary/Secondary Education
4.0%
Other
59.2%
ThreatDown
ThreatDown
Information Technology and Services
12.7%
Computer & Network Security
6.9%
Construction
4.6%
Computer Software
4.4%
Education Management
3.9%
Other
67.5%
Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise Application Management
Add Microsoft Intune Enterprise Application Management
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Add Symantec End-user Endpoint Security
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
ThreatDown
ThreatDown Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Discussions
Absolute Secure Endpoint
Absolute Secure Endpoint Discussions
What is Absolute's Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
What are the features that come with Absolute's different editions?
1 Comment
Official Response from Absolute Secure Endpoint
You can find the breakdown of which features are tied to the different editions of Absolute here: https://www.absolute.com/en/products/editions Read more
ThreatDown
ThreatDown Discussions
Is Malwarebytes enough for your computer to be 100% secure?
5 Comments
Surabhi P.
SP
Malware bytes Premium & End-Point Protection provides Protection from Viruses, Malware, Ransomware-type of malware, Adware,Spyware,Trojans, PUPs, PUMs,...Read more
What is malwarebytes tray application?
4 Comments
Nicolas G.
NG
You don't need any anti-virus/malware protection on your mac if it isn't too old? Read more
Using Malwarebytes EDR in a midsize company needs extra investment for web filter?
4 Comments
RH
The MB web detections works great against malware, but maybe for the midsize companies, instead for a perimeter investment besides the firewall, the MB can...Read more