Introducing G2.ai, the future of software buying.Try now

Absolute Secure Endpoint Reviews & Product Details

Value at a Glance

Averages based on real user reviews.

Time to Implement

2 months

Absolute Secure Endpoint Integrations

(2)
Verified by Absolute Secure Endpoint

Absolute Secure Endpoint Media

Absolute Secure Endpoint Demo - Absolute Dashboard & Widgets
Collect and analyze incredibly rich information from each device, identify activities and precursors to security incidents, integrate this deep insight with SIEM and other enterprise solutions, or use our Security Posture Dashboard.
Absolute Secure Endpoint Demo - Device Management Features: Geofencing
Geofencing monitors assets via Google Maps, including recent and historical locations. Create geofences based on corporate policies. Investigate devices entering unauthorized locations.
Absolute Secure Endpoint Demo - Application Persistence
If a critical application is removed, disabled, or tampered with, Application Persistence initiates an automatic, zero-touch re-installation so you can proactively eliminate vulnerabilities.
Absolute Secure Endpoint Demo - Absolute Reach Scripts
Rapidly query or remediate any device to eliminate vulnerabilities and regain compliance anytime, anywhere, on any endpoint.
Absolute Secure Endpoint Demo - Endpoint Data Discovery
Identify and remediate non-compliant data access. Discover sensitive data and assess the risk exposure.
Absolute Secure Endpoint Demo - Device Freeze
Freeze Devices
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video
Product Avatar Image

Have you used Absolute Secure Endpoint before?

Answer a few questions to help the Absolute Secure Endpoint community

Absolute Secure Endpoint Reviews (406)

View 2 Video Reviews
Reviews

Absolute Secure Endpoint Reviews (406)

View 2 Video Reviews
4.6
407 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Scott W.
SW
Information Technology Trainer
Enterprise (> 1000 emp.)
"Excellent Tool for Asset Management and Administration"
What do you like best about Absolute Secure Endpoint?

It's a great tool too manage user devices. It is great at managing and easy to use. The ability to lock down a machine that's been compromised or lost, or may be being used for malicious reasons is extremely useful. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Thus far I have not run into anything that it's not able to do for what I need. Review collected by and hosted on G2.com.

Verified User in Law Practice
AL
Mid-Market (51-1000 emp.)
"Outstanding Geolocation Features, Loving the Experience So Far"
What do you like best about Absolute Secure Endpoint?

The geolocation and monitoring of the devices are one of the best things we really appreciate to have Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

We have just started but we are loving the tool so far that I can't see anything that I would dislike Review collected by and hosted on G2.com.

AM
Services Support Engineer
Information Technology and Services
Small-Business (50 or fewer emp.)
"It is 100% safe for the user's and equipment's security."
What do you like best about Absolute Secure Endpoint?

The management of teams in the tool and the security we can provide for the equipment in any circumstance, that is, to prevent information theft, theft, or loss of hardware. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Have more control over the licenses, that is, be able to assign the licenses to a project. Review collected by and hosted on G2.com.

AM
IT Director
Small-Business (50 or fewer emp.)
"Simple, optimization, and employment for security and monitoring"
What do you like best about Absolute Secure Endpoint?

I like the fact that the product allows us the ability to track our devices and monitor our devices, along with auditing the devices as well. Built-in at a hardware level it provides the upmost support so that way the device is not completely lost out of our asset management system. the ability for the device to provide ailed information as well as sending commands to it provide a great ability for us to track and secure our devices. The deployment for the devices was not very difficult, once added with the serial number, the devices were able to be enrolled, some support documentation did take a little bit longer to review. However, the support documentations did lead to multiple pages which caused a little excessive reading, but it did provide the information that was needed. Once we did get the devices enrolled and call into the monitoring center, it just took a little bit of time for the devices to fully check in, it would be great to see more of a video walk-through of each set up of each device and how to guide because videos will answer a bunch more questions reading a set up guide. The devices are consistently tracked and check in 24 hours every day, or you can set the devices to check in sooner if you need them too. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Some of the automated scripts are a little bit difficult to produce, and some of the scripts that should be standardized are not in the script library, you would have to make those yourself. Other software asset tracking systems and remote monitoring systems do have scrips built in that provide a simple and efficient means of monitoring and updating devices, whereas this product is not very strong in that area. Review collected by and hosted on G2.com.

LL
Soporte
Mid-Market (51-1000 emp.)
"Excellent Protection."
What do you like best about Absolute Secure Endpoint?

I quite like the resilience it handles and the response to ransomware, which is important nowadays. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

At the moment, I don't see any area of opportunity; I like the service provided. Review collected by and hosted on G2.com.

CT
Cybersecurity Analyst
Enterprise (> 1000 emp.)
"Great product for monitoring"
What do you like best about Absolute Secure Endpoint?

I like being able to monitor devices no matter what wifi they log into. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

The process for adding licenses takes a long time to process Review collected by and hosted on G2.com.

PJ
Network Engineer
Mid-Market (51-1000 emp.)
"Great tool and easy to use"
What do you like best about Absolute Secure Endpoint?

This tool has the ability to easily remotely lock down machines at the BIOS to make them unusable. You can also setup automation to where it auto locks the device upon a defined offline set of days. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Sometimes device online status can be shaky. Devices will go offline for no reason, and not show for days at a time. Review collected by and hosted on G2.com.

Joseph T.
JT
Patching and Deployment Engineer
Enterprise (> 1000 emp.)
"Secure Protection for Endpoints"
What do you like best about Absolute Secure Endpoint?

Absolutes automation services are what really makes it stand out. Geo-tracking is extremely important, and when a system leaves the fenced area, we can have it frozen nearly immediately automatically. Additional plans even allow Absolute to regularly validate your security stack installed on end clients to make sure that it is installed, and up to date. All of this is extremely important in a world where more and more workers are remote or travelling. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

So far the only downside we have had is with getting the agents to check in initially. There is also sometimes a delay between when the system is detected outside of the geofence, and when that is reported to Absolute. It most has to do with the interval of the data transmission, and the Absolute team has been great at working with us on improving this service. Review collected by and hosted on G2.com.

Destiny C.
DC
Desktop Support Technician
Mid-Market (51-1000 emp.)
"Extremely Thorough!"
What do you like best about Absolute Secure Endpoint?

It's very convenient to see many important statistics at a glance instead of clicking through pages upon pages in other programs. Usage time, device health, location, and installed applications are quickly accessible and the UI is user friendly. Implementation and integration were easy across all devices - we use this every day in our company. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

I have not come across a downside so far! Review collected by and hosted on G2.com.

JC
Network Engineer Advisor
Mid-Market (51-1000 emp.)
"Absolute Secure Endpoint is one of our preferred programs we use in our company."
What do you like best about Absolute Secure Endpoint?

We like how easy it is to manage the portal for Absolute Secure Endpoint. We love all the features including freezing devices, tracking missing devices, etc. We collect all kinds of information from all devices and it helps us save lots of money. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

I don't dislike anything about this product. Review collected by and hosted on G2.com.

Pricing Insights

Averages based on real user reviews.

Time to Implement

2 months

Return on Investment

20 months

Average Discount

9%

Absolute Secure Endpoint Comparisons
Product Avatar Image
Microsoft Intune Enterprise Application Management
Compare Now
Product Avatar Image
CrowdStrike Falcon Endpoint Protection Platform
Compare Now
Product Avatar Image
Prey
Compare Now
Absolute Secure Endpoint Features
Reporting and Alerts
Usage Information
Compliance
Web Control
Application Control
System Isolation
Firewall
Endpoint Intelligence
Product Avatar Image
Product Avatar Image