Introducing G2.ai, the future of software buying.Try now

Absolute Secure Endpoint Reviews & Product Details

Value at a Glance

Averages based on real user reviews.

Time to Implement

2 months

Absolute Secure Endpoint Integrations

(2)
Verified by Absolute Secure Endpoint

Absolute Secure Endpoint Media

Absolute Secure Endpoint Demo - Absolute Dashboard & Widgets
Collect and analyze incredibly rich information from each device, identify activities and precursors to security incidents, integrate this deep insight with SIEM and other enterprise solutions, or use our Security Posture Dashboard.
Absolute Secure Endpoint Demo - Device Management Features: Geofencing
Geofencing monitors assets via Google Maps, including recent and historical locations. Create geofences based on corporate policies. Investigate devices entering unauthorized locations.
Absolute Secure Endpoint Demo - Application Persistence
If a critical application is removed, disabled, or tampered with, Application Persistence initiates an automatic, zero-touch re-installation so you can proactively eliminate vulnerabilities.
Absolute Secure Endpoint Demo - Absolute Reach Scripts
Rapidly query or remediate any device to eliminate vulnerabilities and regain compliance anytime, anywhere, on any endpoint.
Absolute Secure Endpoint Demo - Endpoint Data Discovery
Identify and remediate non-compliant data access. Discover sensitive data and assess the risk exposure.
Absolute Secure Endpoint Demo - Device Freeze
Freeze Devices
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video
Product Avatar Image

Have you used Absolute Secure Endpoint before?

Answer a few questions to help the Absolute Secure Endpoint community

Absolute Secure Endpoint Reviews (406)

View 2 Video Reviews
Reviews

Absolute Secure Endpoint Reviews (406)

View 2 Video Reviews
4.6
407 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
LC
Mid-Market (51-1000 emp.)
"Great Customer service"
What do you like best about Absolute Secure Endpoint?

The customer service responds quickly and always follows up. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

The reporting can be diffuclt understanding Review collected by and hosted on G2.com.

Phil R.
PR
Enterprise (> 1000 emp.)
"Absolute. Absolutely performs"
What do you like best about Absolute Secure Endpoint?

And trying to keep track of 35,000 students and their devices it allows me to quickly compare who a device is assigned to and who it is last being used by and when Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

The only thing that I'd really love to have better would be to be able to export the last known location that is pinpointed within the service for every device and export it to excel Review collected by and hosted on G2.com.

Verified User in Oil & Energy
IO
Enterprise (> 1000 emp.)
"Great experience, really helps us keep track of our laptops"
What do you like best about Absolute Secure Endpoint?

helps us keep track of our laptops and freeze devices if necessary Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

One of the downsides was the search function but the new update to the website recently made that a lot easier to navigate. Review collected by and hosted on G2.com.

Verified User in Computer Software
AC
Enterprise (> 1000 emp.)
"Great for monitoring company assets"
What do you like best about Absolute Secure Endpoint?

Easy to track all machines and the location accuracy is a big plus. The ability to create local administrator accounts is also amazing when users get locked out of their machines or get removed from the domain, a real life saver. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Not much, when you first log in and go to search for an asset if you type too quickly the search goes away and you have to re-try, other than that just being able to search by users on a machine would be nice. Review collected by and hosted on G2.com.

IT
IT Support Specialist
Mechanical or Industrial Engineering
Enterprise (> 1000 emp.)
"Absolute Review"
What do you like best about Absolute Secure Endpoint?

With Absolute, I can track my assets, arrange reports according to essential filters. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

There is nothing much I dislike about Absolute. Review collected by and hosted on G2.com.

JL
Mid-Market (51-1000 emp.)
"Absolute Secure Endpoint Review"
What do you like best about Absolute Secure Endpoint?

Ease of use. Not much training and could use it right away.

How accessable it is. Could use and access it in the office and on my mobile device while during business hour and off hours. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

The delay. We have a lot of devices with Absolute Secure Endpoint and some times it takes awhile searching. Review collected by and hosted on G2.com.

JM
Director
Mid-Market (51-1000 emp.)
"Find it and freeze it!"
What do you like best about Absolute Secure Endpoint?

The geolocation tracking component of Absolute is great. Very accurate and keeps a history of where the device has been. Since laptops tend to grow feet and walk away, it's been helpful to keep track where the equipment is at all times. And when needed, we can freeze or wipe the device should anything happen with the employee or device itself. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

I'm currently using a software deployment tool called Immy to help push our Absolute to devices. Immy is capable of verifying that the deployed software (Adobe Reader, Zoom, etc.) has been installed successfully. But Absolute is a silent agent ... it doesn't show up in Windows at all, not in the programs list, the registry, etc. So Immy can't truly tell if it was successful or not. The only ways to tell if it worked is if you log into the Absolute portal and the device shows up there. There has been a few times the device has NOT showed up in the portal so that's been fun to troubleshooting. Absolute does have a tool you can run on the device itself to run some CLI commands but I've had mixed results with it. Not very intuitive. Review collected by and hosted on G2.com.

Verified User in Primary/Secondary Education
AP
Enterprise (> 1000 emp.)
"I have learned so much using Absolute Secure Endpoint!"
What do you like best about Absolute Secure Endpoint?

If I had to choose 1 feature, I would pick Application Persistence for applications we use like VMWare Carbon Black and Microsoft BitLocker; since we use both of those apps for our web security and drive encryption, respectively, having Absolute there to keep our systems, users and their data, secure is comforting. Also, the Geolocation services partnered with their advanced reporting features that allow us to know when a device has left the city/state/country and give us a notification and report is crucial to our inventory allocation processes. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

I don't really have any issues with Absolute Secure Endpoint. If I had to pick 1 thing, I guess it would be the "a la carte" pricing on our device licenses. If Absolute offered a domain pricing option, I think our administrators would feel better about the funds spent on it. Review collected by and hosted on G2.com.

TN
Enterprise (> 1000 emp.)
"Endpoint protection"
What do you like best about Absolute Secure Endpoint?

Absolute Secure Endpoint includes its ease of use, comprehensive security features, and the ability to track and protect devices both on and off the network. Additionally, its ability to remotely wipe data from lost or stolen devices and its real-time monitoring capabilities are also praised by users. Overall, customers appreciate the peace of mind that comes with using a reliable and effective endpoint security solution like Absolute. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Absolute Secure Endpoint can be resource-intensive and may impact the performance of older machines. Additionally, some customers have expressed concerns about the cost of the product, which can be higher than other endpoint security solutions on the market. That being said, these concerns are subjective and may not be applicable to all users. Review collected by and hosted on G2.com.

NS
IT Manager
Mid-Market (51-1000 emp.)
"Great ideas, needs some work to get right"
What do you like best about Absolute Secure Endpoint?

Intuitive where it should be. Scripting and automation layed out like a non-engineer can understand. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Slow to make changes to things that are not working. Sluggish interface. Unreliable updates. Review collected by and hosted on G2.com.

Pricing Insights

Averages based on real user reviews.

Time to Implement

2 months

Return on Investment

20 months

Average Discount

9%

Absolute Secure Endpoint Comparisons
Product Avatar Image
Microsoft Intune Enterprise Application Management
Compare Now
Product Avatar Image
CrowdStrike Falcon Endpoint Protection Platform
Compare Now
Product Avatar Image
Prey
Compare Now
Absolute Secure Endpoint Features
Reporting and Alerts
Usage Information
Compliance
Web Control
Application Control
System Isolation
Firewall
Endpoint Intelligence
Product Avatar Image
Product Avatar Image