Introducing G2.ai, the future of software buying.Try now

Absolute Secure Access Reviews & Product Details

Value at a Glance

Averages based on real user reviews.

Time to Implement

2 months

Absolute Secure Access Integrations

(2)
Verified by Absolute Secure Access

Absolute Secure Access Media

Absolute Secure Access Demo - Secure Web Gateway
Secure Web Gateway impact with detailed drill downs to active and prevented threats
Absolute Secure Access Demo - Network Vulnerabilities
Critical network vulnerabilities and devices affected
Absolute Secure Access Demo - Suspicious Network Traffic
56 Suspicious network traffic and vulnerabilities by category
Absolute Secure Access Demo - File Transfer Summary
File transfer summary by action, user, device, profile and status
Ensure secure remote access, without sacrificing on experience. Absolute provides resilient network connectivity for users to securely access critical resources in the public cloud, private data centers, and on-premises.
Play Absolute Secure Access Video
Ensure secure remote access, without sacrificing on experience. Absolute provides resilient network connectivity for users to securely access critical resources in the public cloud, private data centers, and on-premises.
Product Avatar Image

Have you used Absolute Secure Access before?

Answer a few questions to help the Absolute Secure Access community

Absolute Secure Access Reviews (223)

View 1 Video Reviews
Reviews

Absolute Secure Access Reviews (223)

View 1 Video Reviews
4.7
224 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Harry B.
HB
Sr. Application Systems Specialist
Enterprise (> 1000 emp.)
"Works great and great support"
What do you like best about Absolute Secure Access?

The Secure Access is easy to work with and now allows us to work with other MFA options. Connections seem to hold well and we get some great reporting from IFN. The updating and licensing updates are simple. Support is fantastic. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Access?

I have really come into many issues that I dislike. Review collected by and hosted on G2.com.

DA
Small-Business (50 or fewer emp.)
"Absolute Secure Access VPN experience"
What do you like best about Absolute Secure Access?

It iseasy to install and manage. Setup was straightforward and support is there if you need it. The stability of the connection allows for use of even some very network intensive applications without need for a Citrix desktop or other solution. Being on the VPN is very close to being in the building for a user experience. Security is very high and the dashboard allows for loggin of use.

Our users report a much more stable and lasting connection which facilitates such intensive applications as Solidworks PDM to work so even our remote sales people can discuss drawings and specifications with the customer. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Access?

The Secure Access connection can take over the internet connection and if it fails to connect, (user forgot password etc) then they may have no connection to the internet at all until they disable the connection. This is more difficult as we use Duo 2 factor authentication, and that is not so freindly with no internet connection.

This is easily fixed by setting the client to not automatically connect. Review collected by and hosted on G2.com.

DT
Senior Network Engineer
Enterprise (> 1000 emp.)
"Secure Access is the best VPN"
What do you like best about Absolute Secure Access?

It provides a great defense against bad actors while meeting CJIS FIPS compliance. I have used this product for over five years and it the best VPN product i have ever used. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Access?

The decreased bandwidth due to encryption could be improved. Review collected by and hosted on G2.com.

JD
IT Manager
Mid-Market (51-1000 emp.)
"I have worked with Absoulute Secure Access, I cannot recommend this solution right now."
What do you like best about Absolute Secure Access?

Its direct connection to active directory and the interface that allows a person to see if the servers are performing. The customer support is not bad. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Access?

You should consider Clustering and Auto Scaling servers as needed. It is not easy to implement. Review collected by and hosted on G2.com.

Verified User in Insurance
II
Mid-Market (51-1000 emp.)
"A leading solution that just works"
What do you like best about Absolute Secure Access?

Great product, loads of configuration options and feature rich, customer service is maket leading. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Access?

It's not the cheapest product on the market, but you get what you pay for. Review collected by and hosted on G2.com.

Verified User in Law Enforcement
AL
Mid-Market (51-1000 emp.)
"Great VPN product"
What do you like best about Absolute Secure Access?

Easy for users to connect. UI is great for management. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Access?

I noticed that sometimes different software versions do not play well together. Review collected by and hosted on G2.com.

TW
Mid-Market (51-1000 emp.)
"Very intuitive and 'hands off' VPN. Much recommended."
What do you like best about Absolute Secure Access?

Ease of use. Absolute Secure Access is a very hands off VPN solution. Meaning that even the least IT-savvy of our end users can benefit from this VPN.. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Access?

Absolutely nothing to dislike about Absolute Secure Access. Review collected by and hosted on G2.com.

JP
System Engineer
Enterprise (> 1000 emp.)
"Absolut Secure Access Review"
What do you like best about Absolute Secure Access?

It simple to use and configure various options. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Access?

Would like to see more user access controls to allow support Teams to monitor and manage certain areas of the configuration. Review collected by and hosted on G2.com.

TP
Systems Programming Analyst
Enterprise (> 1000 emp.)
"Easy to use"
What do you like best about Absolute Secure Access?

Real time location of devices - makes troubleshooting easier. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Access?

It has a limit on how many devices can be deployed per pool which makes it difficult to manage. Review collected by and hosted on G2.com.

LA
Mid-Market (51-1000 emp.)
"Absolute has been one of the best remote connectivity applications we've ever used."
What do you like best about Absolute Secure Access?

Absolute is always on even when there is no user logged on to the machine. We can deploy updates and make sure that the software on the computer is client even before a user logs in. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Access?

My biggest problem with ASAC is the manner in which it registers DNS entries. It make it difficult to accuratly connect to a computer remotely because both the physical network connecton and the virtual network connections get registered in DNS. If there was a way to tell the client to register a certain connection depending on the IP address of the physical adapter, that would be excellent. Review collected by and hosted on G2.com.

Pricing Insights

Averages based on real user reviews.

Time to Implement

2 months

Return on Investment

22 months

Average Discount

10%

Absolute Secure Access Comparisons
Product Avatar Image
Zscaler Internet Access
Compare Now
Product Avatar Image
Palo Alto Networks GlobalProtect
Compare Now
Product Avatar Image
OpenVPN CloudConnexa
Compare Now
Absolute Secure Access Features
Multi-Device Usage
Multiple Concurrent Connections
Unlimited Bandwidth
Live Customer Support
Multiple Payment Methods
Network Segmentation
Network Mapping
Security Analytics
Security Automation
Application Security
Data Protection
Product Avatar Image
Product Avatar Image