Introducing G2.ai, the future of software buying.Try now

Absolute Secure Endpoint Pricing Overview

Absolute Secure Endpoint has not provided pricing information for this product or service. This is common practice for software sellers and service providers. Contact Absolute Secure Endpoint to obtain current pricing.

Pricing Insights

Averages based on real user reviews.

Time to Implement

2 months

Return on Investment

20 months

Average Discount

9%

Perceived Cost

$$$$$

Absolute Secure Endpoint Pricing Reviews

(1)
Jeremy B.
JB
System Engineer
Hospital & Health Care
Enterprise (> 1000 emp.)
"Absolutely essential security! Do you know where your endpoints are? What they are being used for?"
What do you like best about Absolute Secure Endpoint?

Ability to track our endpoints throughout the life of the machine, monitor compliance, freeze devices for compliance or theft, peace of mind that the agent is tamper resistant, ability to physically locate the devices, enforce security policies remotely. Customer support is great, and we are able to get quick responses when we open a ticket with clear resolutions. Our team appreciates the updates to the console as it is straight forward to use and the agent activation was easy to integrate into our imaging process. We use it daily to manage and track devices and look forward to integrating into our SNOW CMDB in the near future. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Honestly, not many downsides - biggest issue we have at the moment is the licensing model. We have put in a request to "downgrade" machines that are in a "frozen/Wipe/unenroll" state as they still take up a regular license while in a "limbo" or transitional state. Sometimes we are not able to account for the device and although we would like to unenroll the machine, we still want the ability to wipe any data from it prior to unenroll - were it ever to come back online. These types of machines still require a full license even though they may never come back online and are not being actively managed. Review collected by and hosted on G2.com.

Absolute Secure Endpoint Comparisons
Product Avatar Image
Microsoft Intune Enterprise Application Management
Compare Now
Product Avatar Image
CrowdStrike Falcon Endpoint Protection Platform
Compare Now
Product Avatar Image
Prey
Compare Now
Product Avatar Image
Product Avatar Image