Introducing G2.ai, the future of software buying.Try now

Absolute Secure Endpoint Reviews & Product Details

Value at a Glance

Averages based on real user reviews.

Time to Implement

2 months

Absolute Secure Endpoint Integrations

(2)
Verified by Absolute Secure Endpoint

Absolute Secure Endpoint Media

Absolute Secure Endpoint Demo - Absolute Dashboard & Widgets
Collect and analyze incredibly rich information from each device, identify activities and precursors to security incidents, integrate this deep insight with SIEM and other enterprise solutions, or use our Security Posture Dashboard.
Absolute Secure Endpoint Demo - Device Management Features: Geofencing
Geofencing monitors assets via Google Maps, including recent and historical locations. Create geofences based on corporate policies. Investigate devices entering unauthorized locations.
Absolute Secure Endpoint Demo - Application Persistence
If a critical application is removed, disabled, or tampered with, Application Persistence initiates an automatic, zero-touch re-installation so you can proactively eliminate vulnerabilities.
Absolute Secure Endpoint Demo - Absolute Reach Scripts
Rapidly query or remediate any device to eliminate vulnerabilities and regain compliance anytime, anywhere, on any endpoint.
Absolute Secure Endpoint Demo - Endpoint Data Discovery
Identify and remediate non-compliant data access. Discover sensitive data and assess the risk exposure.
Absolute Secure Endpoint Demo - Device Freeze
Freeze Devices
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video
Product Avatar Image

Have you used Absolute Secure Endpoint before?

Answer a few questions to help the Absolute Secure Endpoint community

Absolute Secure Endpoint Reviews (406)

View 2 Video Reviews
Reviews

Absolute Secure Endpoint Reviews (406)

View 2 Video Reviews
4.6
407 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
John P.
JP
Director of IT
Mid-Market (51-1000 emp.)
"Critical to the Security Stack"
What do you like best about Absolute Secure Endpoint?

Absolute Secure Endpoint comes installed with every new Dell laptop we purchase. It just works. Immutable and reliable. We've used it to locate, lock and wipe rouge devices. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

That I don't have it on cellphones and tablets. Review collected by and hosted on G2.com.

JK
Senior Network Engineer
Mid-Market (51-1000 emp.)
"Gives you full control of your devices."
What do you like best about Absolute Secure Endpoint?

The ability to freeze, wipe or locate a device. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Nothing, I absolutely love the product and recommend to everyone. Review collected by and hosted on G2.com.

NL
Information Systems Technician
Mid-Market (51-1000 emp.)
"Absolute: A useful but complicated product"
What do you like best about Absolute Secure Endpoint?

Absolute Secure Endpoint provides a user friendly interface that is easy to navigate while also giving those with more experience the ability to use more complicated tools. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Absolute Secure Endpoint is a bit too complicated when it comes to pushing scripts and programs, such as powershell scripts. Review collected by and hosted on G2.com.

LD
Infrastructure Analyst
Enterprise (> 1000 emp.)
"A robust suite of security and management capabilities for endpoints"
What do you like best about Absolute Secure Endpoint?

- Ease of visibility of the endpoints.

- Ability to completely lock-out the computer

- The ability to recover even after re-imaging the computer.

- The ability to completely wipe the computer if lose or misplaced. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

- Inability to remotely control the computer in terms of RDP session. Review collected by and hosted on G2.com.

Verified User in Manufacturing
AM
Mid-Market (51-1000 emp.)
"Good service"
What do you like best about Absolute Secure Endpoint?

Absolute Secure Endpoint helps me keep track of my systems Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

I don't have anything negative to say about Absolute Secure Endpoint. Review collected by and hosted on G2.com.

RB
IT Associate
Small-Business (50 or fewer emp.)
"Syxsense is a game changer!"
What do you like best about Absolute Secure Endpoint?

The software is incredibly user-friendly, making it easy for our IT team to deploy patches across all systems seamlessly. The automated scheduling feature ensures that our systems are always up-to-date without any manual intervention, significantly reducing downtime and enhancing productivity. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

We have not encountered any features we do not like. Review collected by and hosted on G2.com.

AN
Network Administrator
Mid-Market (51-1000 emp.)
"The Benefits of Absolute"
What do you like best about Absolute Secure Endpoint?

My department has used Absolute to flawlessly track down numerous lost and/or stolen devices. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

I have never had any issues with Absolute, so I cannot properly answer this question. Review collected by and hosted on G2.com.

Verified User in Hospital & Health Care
AH
Enterprise (> 1000 emp.)
"Review of Absolute"
What do you like best about Absolute Secure Endpoint?

Secure tracking and locking down of endpoints. Sensitive data reporting. Machine information and connection history. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

I wish that automations had more flexibility, for example, using automations with custom data points. Review collected by and hosted on G2.com.

Verified User in Higher Education
UH
Enterprise (> 1000 emp.)
"A unique tool for in depth endpoint control"
What do you like best about Absolute Secure Endpoint?

Absolute is reliable in reporting on edpoint status. It gives us assurance that we will be able to track devices even if they are lost or stolen in a way that many other tools can't. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Limited functionallity for making configuration changes such as installing new applications or patching. Review collected by and hosted on G2.com.

Christian W.
CW
SR IT Systems Specialist
Enterprise (> 1000 emp.)
"Thurough and powerful endpoint asset protection solution"
What do you like best about Absolute Secure Endpoint?

I tried everything I could to get around the Endpoint Protection provided by Absolute and it always kicked in and protected the machine from unauthorized use. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Some features aren't available on older platforms, but if you're wanting to protect new assets, all the features will more than likely be available. Review collected by and hosted on G2.com.

Pricing Insights

Averages based on real user reviews.

Time to Implement

2 months

Return on Investment

20 months

Average Discount

9%

Absolute Secure Endpoint Comparisons
Product Avatar Image
Microsoft Intune Enterprise Application Management
Compare Now
Product Avatar Image
CrowdStrike Falcon Endpoint Protection Platform
Compare Now
Product Avatar Image
Prey
Compare Now
Absolute Secure Endpoint Features
Reporting and Alerts
Usage Information
Compliance
Web Control
Application Control
System Isolation
Firewall
Endpoint Intelligence
Product Avatar Image
Product Avatar Image