Compare Absolute Secure Endpoint and ThreatDown

At a Glance
Absolute Secure Endpoint
Absolute Secure Endpoint
Star Rating
(407)4.6 out of 5
Market Segments
Mid-Market (49.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Absolute Secure Endpoint
ThreatDown
ThreatDown
Star Rating
(1,082)4.6 out of 5
Market Segments
Small-Business (47.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial 1 Device Per Year
Free Trial is available
Browse all 3 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that ThreatDown excels in ease of use, with many users highlighting its comprehensive management console that simplifies navigation and monitoring of enterprise computers. This user-friendly interface is noted to save time and enhance productivity.
  • Users say that Absolute Secure Endpoint stands out for its robust device protection, ensuring that even if critical hardware components are replaced, the device remains secure and manageable. This persistent protection is particularly valued in environments with remote users.
  • Reviewers mention that ThreatDown has a significant advantage in implementation speed, with many users appreciating the quick onboarding process that allows them to get up and running without extensive delays.
  • According to verified reviews, Absolute Secure Endpoint has improved over time, with users noting that the product has become more functional and feature-rich, thanks to consistent solicitation of user feedback for its development roadmap.
  • G2 reviewers highlight that ThreatDown has a higher volume of recent reviews, indicating a more active user base and up-to-date feedback, which can be crucial for potential buyers looking for reliable and current insights.
  • Users express that while both products offer solid support, Absolute Secure Endpoint receives slightly higher marks for quality of support, with users appreciating the responsiveness and helpfulness of the support team when issues arise.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
ThreatDown
Endpoint Protection - 14 Day Trial
Free Trial
1 Device Per Year
Browse all 3 pricing plans
Free Trial
Absolute Secure Endpoint
No trial information available
ThreatDown
Free Trial is available
Ratings
Meets Requirements
9.1
323
9.2
968
Ease of Use
8.7
326
9.2
973
Ease of Setup
8.8
275
9.2
735
Ease of Admin
8.8
295
9.1
705
Quality of Support
8.9
309
8.8
866
Has the product been a good partner in doing business?
9.3
288
9.2
685
Product Direction (% positive)
9.0
317
8.9
958
Features by Category
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
9.1
26
Not enough data
Scope
9.5
22
Not enough data
8.8
24
Not enough data
Security
9.0
26
Not enough data
9.2
24
Not enough data
9.4
24
Not enough data
Management
8.9
25
Not enough data
9.0
23
Not enough data
9.5
25
Not enough data
9.5
26
Not enough data
8.6
20
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.5
54
8.9
293
Administration
8.9
48
9.1
230
8.2
35
8.8
237
8.3
38
8.9
220
9.3
50
8.5
203
9.0
47
8.8
223
Functionality
8.9
42
8.9
212
7.4
33
8.9
213
8.6
41
9.0
246
7.3
32
9.6
260
Analysis
8.2
38
9.0
235
8.9
39
8.9
239
8.4
35
8.9
221
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
8.7
130
Platform Features
Not enough data
9.1
123
Not enough data
9.2
122
Not enough data
8.9
118
Not enough data
9.2
122
Not enough data
9.3
123
Not enough data
8.7
120
Not enough data
9.5
10
Automation Capabilities
Not enough data
9.1
121
Not enough data
9.1
121
Not enough data
5.3
5
Not enough data
6.9
170
Generative AI
Not enough data
6.8
170
Not enough data
6.9
156
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.6
88
7.4
115
Generative AI
7.6
75
7.4
115
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.7
13
Services - Endpoint Detection & Response (EDR)
Not enough data
9.7
13
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Absolute Secure Endpoint
Absolute Secure Endpoint
ThreatDown
ThreatDown
Absolute Secure Endpoint and ThreatDown are categorized as Endpoint Protection Platforms and Endpoint Management
Unique Categories
Absolute Secure Endpoint
Absolute Secure Endpoint is categorized as Unified Endpoint Management (UEM)
Reviews
Reviewers' Company Size
Absolute Secure Endpoint
Absolute Secure Endpoint
Small-Business(50 or fewer emp.)
11.6%
Mid-Market(51-1000 emp.)
49.9%
Enterprise(> 1000 emp.)
38.5%
ThreatDown
ThreatDown
Small-Business(50 or fewer emp.)
47.0%
Mid-Market(51-1000 emp.)
41.1%
Enterprise(> 1000 emp.)
11.8%
Reviewers' Industry
Absolute Secure Endpoint
Absolute Secure Endpoint
Information Technology and Services
12.8%
Hospital & Health Care
10.8%
Financial Services
8.8%
Computer & Network Security
4.3%
Computer Software
4.0%
Other
59.2%
ThreatDown
ThreatDown
Information Technology and Services
12.8%
Computer & Network Security
7.0%
Construction
4.6%
Computer Software
4.4%
Education Management
4.0%
Other
67.3%
Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise...
Add Microsoft Intune Enterprise Application Management
ManageEngine Endpoint Central
ManageEngine Endpoint Central
Add ManageEngine Endpoint Central
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
ThreatDown
ThreatDown Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Discussions
Absolute Secure Endpoint
Absolute Secure Endpoint Discussions
What is Absolute's Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
What are the features that come with Absolute's different editions?
1 Comment
Official Response from Absolute Secure Endpoint
You can find the breakdown of which features are tied to the different editions of Absolute here: https://www.absolute.com/en/products/editions Read more
ThreatDown
ThreatDown Discussions
Is Malwarebytes enough for your computer to be 100% secure?
5 Comments
Surabhi P.
SP
Malware bytes Premium & End-Point Protection provides Protection from Viruses, Malware, Ransomware-type of malware, Adware,Spyware,Trojans, PUPs, PUMs,...Read more
What is malwarebytes tray application?
4 Comments
Nicolas G.
NG
You don't need any anti-virus/malware protection on your mac if it isn't too old? Read more
Using Malwarebytes EDR in a midsize company needs extra investment for web filter?
4 Comments
RH
The MB web detections works great against malware, but maybe for the midsize companies, instead for a perimeter investment besides the firewall, the MB can...Read more