Introducing G2.ai, the future of software buying.Try now

Absolute Secure Endpoint Reviews & Product Details

Value at a Glance

Averages based on real user reviews.

Time to Implement

2 months

Absolute Secure Endpoint Integrations

(2)
Verified by Absolute Secure Endpoint

Absolute Secure Endpoint Media

Absolute Secure Endpoint Demo - Absolute Dashboard & Widgets
Collect and analyze incredibly rich information from each device, identify activities and precursors to security incidents, integrate this deep insight with SIEM and other enterprise solutions, or use our Security Posture Dashboard.
Absolute Secure Endpoint Demo - Device Management Features: Geofencing
Geofencing monitors assets via Google Maps, including recent and historical locations. Create geofences based on corporate policies. Investigate devices entering unauthorized locations.
Absolute Secure Endpoint Demo - Application Persistence
If a critical application is removed, disabled, or tampered with, Application Persistence initiates an automatic, zero-touch re-installation so you can proactively eliminate vulnerabilities.
Absolute Secure Endpoint Demo - Absolute Reach Scripts
Rapidly query or remediate any device to eliminate vulnerabilities and regain compliance anytime, anywhere, on any endpoint.
Absolute Secure Endpoint Demo - Endpoint Data Discovery
Identify and remediate non-compliant data access. Discover sensitive data and assess the risk exposure.
Absolute Secure Endpoint Demo - Device Freeze
Freeze Devices
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video
Product Avatar Image

Have you used Absolute Secure Endpoint before?

Answer a few questions to help the Absolute Secure Endpoint community

Absolute Secure Endpoint Reviews (406)

View 2 Video Reviews
Reviews

Absolute Secure Endpoint Reviews (406)

View 2 Video Reviews
4.6
407 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
MP
Senior Systems Administrator
Mid-Market (51-1000 emp.)
"Reliable, Secure, and Easy to Use"
What do you like best about Absolute Secure Endpoint?

I love the ability to remotely lock a PC when needed, which gives me peace of mind knowing devices are secure no matter where they are. The platform is very easy to use, with a clear and intuitive dashboard that makes it simple to check the status of each PC. Having this visibility and control in one place saves time and improves security management. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

So far, I have not found any significant downsides. It has performed reliably and met our needs without issues. Review collected by and hosted on G2.com.

Verified User in Management Consulting
AM
Enterprise (> 1000 emp.)
"Ultimate Device Protection with Absolute Secure Endpoint"
What do you like best about Absolute Secure Endpoint?

What stands out most about Absolute Secure Endpoint is the level of device protection it provides. Even if key hardware components—like the motherboard or hard drive—are replaced, the device stays protected and fully manageable. That kind of persistence gives me real peace of mind. I also value the global device-tracking capability. As long as the device is powered on, I can see where it is, no matter where it’s located. It’s a powerful and reassuring feature for both security and asset management. The resilience features are another major advantage. Absolute ensures that a set of required applications remain installed and healthy, which helps maintain consistency, security, and compliance across devices. The initial setup was also simple and quick, making deployment straightforward. Overall, the combination of persistent security, tracking, and resilience makes Absolute Secure Endpoint stand out. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

The primary issue I’ve experienced is the slow turnaround time for service requests and updates, which can affect operational efficiency. The ServiceNow integration is helpful, but it still feels limited—especially when it comes to automation. Right now, end users have to rely on the backend team to run automation tasks, which introduces delays. Allowing users to execute more automation directly would make the platform far more flexible and efficient. Review collected by and hosted on G2.com.

"Essential for Remote Device Management"
What do you like best about Absolute Secure Endpoint?

I like that Absolute Secure Endpoint provides me with comprehensive visibility over my devices across the globe. It is reassuring to know the exact locations of my devices, which is especially crucial given the remote nature of many of our users. This visibility ensures that I can monitor and control the devices effortlessly, even when they are not physically within our infrastructure. The ability to track and manage devices remotely means that I can protect our assets by locking them if they are ever lost, stolen, or need to be decommissioned, providing an additional layer of security and control. It brings a sense of comfort and security knowing that I can act swiftly to protect sensitive information and minimize risks associated with device management. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

I find the check-in process for Absolute Secure Endpoint to be cumbersome. It sometimes takes 15 to 20 minutes, or even longer, especially if the device needs an internet connection to check-in. This delay can be frustrating and often requires me to perform a remote restart using Intune or other software to force the device to check-in. Additionally, the initial setup was challenging, as many aspects didn't make sense initially, requiring external assistance from a trainer provided by Dell. Having to rely on additional help for setup indicates the process could be more user-friendly and intuitive. Review collected by and hosted on G2.com.

Nicolas I.
NI
System Analyst
Oil & Energy
Mid-Market (51-1000 emp.)
"Endpoint Visibility and Control"
What do you like best about Absolute Secure Endpoint?

Absolute gives us confidence that no matter where our devices are, they remain visible and under control. The persistence technology is unique — even if a machine is tampered with or reimaged, we still maintain connection. That kind of reliability has saved us time and reduced stress for our IT staff. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

The platform can feel a little complex when you first start using it. There are a lot of powerful options, which is great once you learn them, but it does take some ramp-up time before you feel completely comfortable navigating everything. Review collected by and hosted on G2.com.

JR
Enginner Support
Small-Business (50 or fewer emp.)
"An excellent endpoint to work with"
What do you like best about Absolute Secure Endpoint?

The topic of security with geolocation has helped us a lot, especially in cases where some clients do not pay for the service, as we can block the equipment. We have also had situations where they do not know where the equipment is or it has been stolen, and there we can do the blocking through the BIOS. Even if they erase it, the block remains, which is excellent.

Personally, I haven't been using it for long, but what we have seen so far has worked very well. The use is very intuitive, and both the installation and implementation on the computers are quick and easy. We use it very frequently, and the management from the console is very user-friendly, especially for creating groups and managing the equipment among the different projects we handle.

The software has several useful features, and the best part is that it integrates easily with our current operations. Also, when we raise tickets or requests, customer service has been very good, they always help us resolve doubts clearly and quickly. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

We understand that it is specialized software, we would like to have courses on the new tools that we manage to see as soon as we have questions. Review collected by and hosted on G2.com.

Shawn I.
SI
Desktop Support Technician
Enterprise (> 1000 emp.)
"Excellent software offering with lots of reporting information"
What do you like best about Absolute Secure Endpoint?

We use the software inventory quite often. This allows us to easily see which devices are missing antivirus software or our patch management software. Our LTE devices can connect to it as well, so it's pretty accurate. Absolute support is very good as well; everytime I've called in I have not had to wait on hold for very long and the technicians have been very knowledgeable so the issues have been resolved in a very timely manner Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

We had lost a device and the location history was a little hard to find in the web interface. Whenever I have had to perform actions on missing devices (or any other actions) I have found it difficult to find out what every action does. I have had to use google to figure out which each one Review collected by and hosted on G2.com.

MK
IT Support And Deployment Engineer
Hospital & Health Care
Mid-Market (51-1000 emp.)
"Essential endpoint security and management"
What do you like best about Absolute Secure Endpoint?

Absolute gives us the ability to manage our laptop and desktop estate remotely, providing essential usage and security statistics. Geo-Location and IP reporting helps me keep track of asset locations.

Once installed it's baked into the BIOS so cannot be removed by anybody without authorisation. Even if the HDD is removed and replaced, Absolute will re-download itself and monitor the device!

It now comes with an optional suite of tools to recover your device after a malware attack or if unrecoverable a-la-crowdstrike! Very useful indeed Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

There's nothing to dislike with the product; it does everything we need it to and more! What's more the product is continually being developed and new features are regularly added to improve our endpoint management. Review collected by and hosted on G2.com.

Verified User in Real Estate
UR
Mid-Market (51-1000 emp.)
"Absolute (Previously Syxsense) for Business"
What do you like best about Absolute Secure Endpoint?

As this product has aged it has only gotten better. The functionality and features have improved and they consistently solicit user feedback for their roadmap going forward. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

With the very large feature set, it is starting to encroach on some of the other softwares we have purchased. We have had to migrate processes from other platforms to this one -- and although not a bad thing it is time consuming. Review collected by and hosted on G2.com.

ML
IT Manager
Mid-Market (51-1000 emp.)
"Absolutely the best computer asset tracking and recovery application and service!"
What do you like best about Absolute Secure Endpoint?

There have been several discussions about the Rehydration feature. We have several mission critical systems in the field at all times. The ability to recover these computer system in the event of a catastrophic failure is exciting. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

I have had one laptop the did not freeze. We were able to recover the laptop after 2 months and it did not freeze even after sitting half a day online in the office. I am not sure the issue was with Absolute since that laptop has not been quite right since recovery. Review collected by and hosted on G2.com.

Jeremy B.
JB
System Engineer
Hospital & Health Care
Enterprise (> 1000 emp.)
"Absolutely essential security! Do you know where your endpoints are? What they are being used for?"
What do you like best about Absolute Secure Endpoint?

Ability to track our endpoints throughout the life of the machine, monitor compliance, freeze devices for compliance or theft, peace of mind that the agent is tamper resistant, ability to physically locate the devices, enforce security policies remotely. Customer support is great, and we are able to get quick responses when we open a ticket with clear resolutions. Our team appreciates the updates to the console as it is straight forward to use and the agent activation was easy to integrate into our imaging process. We use it daily to manage and track devices and look forward to integrating into our SNOW CMDB in the near future. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Honestly, not many downsides - biggest issue we have at the moment is the licensing model. We have put in a request to "downgrade" machines that are in a "frozen/Wipe/unenroll" state as they still take up a regular license while in a "limbo" or transitional state. Sometimes we are not able to account for the device and although we would like to unenroll the machine, we still want the ability to wipe any data from it prior to unenroll - were it ever to come back online. These types of machines still require a full license even though they may never come back online and are not being actively managed. Review collected by and hosted on G2.com.

Pricing Insights

Averages based on real user reviews.

Time to Implement

2 months

Return on Investment

20 months

Average Discount

9%

Absolute Secure Endpoint Comparisons
Product Avatar Image
Microsoft Intune Enterprise Application Management
Compare Now
Product Avatar Image
CrowdStrike Falcon Endpoint Protection Platform
Compare Now
Product Avatar Image
Prey
Compare Now
Absolute Secure Endpoint Features
Reporting and Alerts
Usage Information
Compliance
Web Control
Application Control
System Isolation
Firewall
Endpoint Intelligence
Product Avatar Image
Product Avatar Image