Save to My Lists
Paid
Claimed
Optimized for quick response

Absolute Secure Endpoint Reviews & Product Details

JM
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: Seller invite
What do you like best about Absolute Secure Endpoint?

The ability to locate devices. Within our organization it is crucial we keep track of our devices especially with the devices with very sensitive data. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

I dislike that we are unable to turn on location tracking for just one device instead of the whole tenant. Review collected by and hosted on G2.com.

Recommendations to others considering Absolute Secure Endpoint:

If you are thinking about Absolute for your organization do not think twice! It has been one of the best device management solutions we have used by far. Absolute does exactly what it is intended for and has helped our organization manage all our devices! Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

Within our organization we are required to have all devices up to date with the latest patches and MCAfee running. Absolute has given us the ability to manage devices outside our network. Review collected by and hosted on G2.com.

Absolute Secure Endpoint Overview

What is Absolute Secure Endpoint?

The Absolute Secure Endpoint product portfolio leverages the unbreakable connection provided by Absolute Persistence® to enable IT and security personnel to monitor and address computers' problems and enables the computers and their mission-critical applications to self-heal. This helps with IT management, strengthening a company’s security posture, and maintaining compliance • Absolute Visibility collects data about the endpoints' location, security posture, and hardware/software inventory. It provides analysis of software and hardware utilization and identifies potential failure points and suspicious use patterns. • Absolute Control adds to these capabilities to control endpoints over the Internet, allowing for critical functions such as remote file deletion and data wipe, freezing devices on demand when at-risk, end user messaging, as well as establishing geo-fences and alerts. • Absolute Resilience adds further capabilities to secure endpoints from threats and vulnerabilities, respond to security breaches and incidents, and enable Application Resilience to automatically monitor and detect unhealthy applications and automatically heal them. • Absolute Ransomware Response is a standalone offering that enables organizations to assess their ransomware preparedness and cyber hygiene across endpoints; ensures mission-critical security applications such as anti-malware and device management tools remain healthy and capable of self-healing; and expedites the quarantine and recovery of endpoints if a ransomware attack occurs.

Absolute Secure Endpoint Details
Product Website
Languages Supported
German, English, French, Italian, Japanese, Korean, Portuguese, Spanish, Chinese (Simplified)
Show LessShow More
Product Description

Absolute accelerates its customers’ shift to work-from-anywhere through the industry’s first self-healing Zero Trust platform, helping to ensure maximum security and uncompromised productivity. Absolute is the only solution embedded in more than half a billion devices, offering a permanent digital connection that intelligently and dynamically applies visibility, control and self-healing capabilities to endpoints, applications, and network access to help ensure their cyber resilience tailored for distributed workforces.

How do you position yourself against your competitors?

Absolute Secure Endpoint is the only endpoint security solution embedded in the firmware of over 600 million devices.


Seller Details
Company Website
Year Founded
1993
HQ Location
British Columbia, Canada
Twitter
@absolutecorp
4,078 Twitter followers
LinkedIn® Page
www.linkedin.com
1,078 employees on LinkedIn®
Ownership
TSE:ABT
Total Revenue (USD mm)
$197

SG
Overview Provided by:

Recent Absolute Secure Endpoint Reviews

NL
Noah L.Mid-Market (51-1000 emp.)
3.5 out of 5
"Absolute: A useful but complicated product"
Absolute Secure Endpoint provides a user friendly interface that is easy to navigate while also giving those with more experience the ability to us...
Verified User
A
Verified UserEnterprise (> 1000 emp.)
4.5 out of 5
"Review of Absolute"
Secure tracking and locking down of endpoints. Sensitive data reporting. Machine information and connection history.
Verified User
U
Verified UserEnterprise (> 1000 emp.)
3.5 out of 5
"A unique tool for in depth endpoint control"
Absolute is reliable in reporting on edpoint status. It gives us assurance that we will be able to track devices even if they are lost or stolen in...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information
Absolute
Part of Absolute Productivity Bundle
Absolute Secure Endpoint
Absolute Secure Access

This product is part of a Product Suite, meaning that it can be used with a group of additional products to solve a broader business need.

Absolute Secure Endpoint Media

Absolute Secure Endpoint Demo - Absolute Dashboard & Widgets
Collect and analyze incredibly rich information from each device, identify activities and precursors to security incidents, integrate this deep insight with SIEM and other enterprise solutions, or use our Security Posture Dashboard.
Absolute Secure Endpoint Demo - Device Management Features: Geofencing
Geofencing monitors assets via Google Maps, including recent and historical locations. Create geofences based on corporate policies. Investigate devices entering unauthorized locations.
Absolute Secure Endpoint Demo - Application Persistence
If a critical application is removed, disabled, or tampered with, Application Persistence initiates an automatic, zero-touch re-installation so you can proactively eliminate vulnerabilities.
Absolute Secure Endpoint Demo - Absolute Reach Scripts
Rapidly query or remediate any device to eliminate vulnerabilities and regain compliance anytime, anywhere, on any endpoint.
Absolute Secure Endpoint Demo - Endpoint Data Discovery
Identify and remediate non-compliant data access. Discover sensitive data and assess the risk exposure.
Absolute Secure Endpoint Demo - Device Freeze
Freeze Devices
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video
Play Absolute Secure Endpoint Video

Official Downloads

Answer a few questions to help the Absolute Secure Endpoint community
Have you used Absolute Secure Endpoint before?
Yes

Video Reviews

311 out of 312 Total Reviews for Absolute Secure Endpoint

4.6 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.

Absolute Secure Endpoint Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons

Overall Review Sentiment for Absolute Secure EndpointQuestion

Time to Implement
<1 day
>12 months
Return on Investment
<6 months
48+ months
Ease of Setup
0 (Difficult)
10 (Easy)
Log In
Want to see more insights from verified reviewers?
Log in to view review sentiment.
G2 reviews are authentic and verified.
Joseph T.
JT
Patching and Deployment Engineer
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
(Original )Information
What do you like best about Absolute Secure Endpoint?

Absolutes automation services are what really makes it stand out. Geo-tracking is extremely important, and when a system leaves the fenced area, we can have it frozen nearly immediately automatically. Additional plans even allow Absolute to regularly validate your security stack installed on end clients to make sure that it is installed, and up to date. All of this is extremely important in a world where more and more workers are remote or travelling. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

So far the only downside we have had is with getting the agents to check in initially. There is also sometimes a delay between when the system is detected outside of the geofence, and when that is reported to Absolute. It most has to do with the interval of the data transmission, and the Absolute team has been great at working with us on improving this service. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

We need to ensure that the data on our systems does not leave the United States. Absolute's geo-fence helps to facilitate this with geo-gencing and the ability to remotely freeze devices so that the data is not accessable.

We currently have additional plans to use the remote wipe feature to ensure extra security measures are met when scrapping hardware that will no longer be used. Review collected by and hosted on G2.com.

NL
Information Systems Technician
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

Absolute Secure Endpoint provides a user friendly interface that is easy to navigate while also giving those with more experience the ability to use more complicated tools. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Absolute Secure Endpoint is a bit too complicated when it comes to pushing scripts and programs, such as powershell scripts. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

Absolute allows us to check the status of our devices, see what users are using them, and allows us to more accurately assist our users when they are having tech issues. Review collected by and hosted on G2.com.

AN
Network Administrator
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

My department has used Absolute to flawlessly track down numerous lost and/or stolen devices. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

I have never had any issues with Absolute, so I cannot properly answer this question. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

With approximately 6,000+ devices across 14 campuses, it is difficult to keep track of every device. Absolute has allowed us to not only track down lost or stolen devices, but has also decreased the number of lost/stolen events happening. People are not fond of being found with stolen equipment and potential legal actions. Review collected by and hosted on G2.com.

Verified User in Hospital & Health Care
AH
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

Secure tracking and locking down of endpoints. Sensitive data reporting. Machine information and connection history. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

I wish that automations had more flexibility, for example, using automations with custom data points. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

We are able to lock down machines of remote workers if they are termed or temp workers. We are able to run reports of various types which has greatly helped us with asset management. Review collected by and hosted on G2.com.

Verified User in Higher Education
UH
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

Absolute is reliable in reporting on edpoint status. It gives us assurance that we will be able to track devices even if they are lost or stolen in a way that many other tools can't. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Limited functionallity for making configuration changes such as installing new applications or patching. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

Absolute allows us to monitor devices and enforce policies regarding location, security controls, and patching. Review collected by and hosted on G2.com.

Christian W.
CW
SR IT Systems Specialist
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

I tried everything I could to get around the Endpoint Protection provided by Absolute and it always kicked in and protected the machine from unauthorized use. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Some features aren't available on older platforms, but if you're wanting to protect new assets, all the features will more than likely be available. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

We are using Absolute Secure Endpoint to prevent unauthorized removal of equipment from our locations and prompt return of removed assets. Review collected by and hosted on G2.com.

Clive d.
CD
Team Leader: Customer Service Engineer
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

What I like best about absolute secure endpoints is their effortless rollout in our organization, providing seamless integration and robust protection without disrupting existing workflows. the after-sales support has also been tremendously great. we use this product every day in our environment. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

There is not much to falter about this application other than there could be an improvement in the filtering of data. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

This application is solving the greatest problem in asset management by ensuring secure endpoints, which protect valuable data and resources from unauthorized access and cyber threats, thereby maintaining the integrity and efficiency of asset tracking and control. Review collected by and hosted on G2.com.

IS
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

The fact of being able to track the device in real-time and know the exact location as well as the network data being used at the moment. A major factor in case of loss (which has been happening very frequently). Another very important point that makes it worth using Absolute is that it remains trackable even if someone tries to format it. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

It should be possible to delete a device when it is no longer part of our IT infrastructure. They should also review the bulk integration files to allow adding some attribute to devices with the same criteria. I opened a ticket about this possibility, but it has not been answered yet. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

We recovered two pieces of equipment that had been stolen; it was possible to encrypt the disks of all the equipment in the park; we have managed to deploy various applications of our interest... and much more! Review collected by and hosted on G2.com.

Kyle B.
KB
Retiring
Mid-Market(51-1000 emp.)
Validated Reviewer
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

I appreciate being able to track IP numbers and sometimes even tracking the item to an address. There were many a time when I needed to communicate with parents as to sibling switches of device, last person to sign on, and such. It often made things easy to see when 2 students unknowingly traded devices. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Not always did I have permission to see addresses, but when I did, it was nice and to the point. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

Lost devices

Traded devices

Stolen devices Review collected by and hosted on G2.com.

TN
Security Architect
Enterprise(> 1000 emp.)
Validated Reviewer
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

Powerful product for visibility into endpoints Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Not having application control so blacklisting Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

Tracking stolen endpoints and more importantly identifying risky endpoints using EDD Review collected by and hosted on G2.com.