Absolute Secure Endpoint Features
What are the features of Absolute Secure Endpoint?
Security
- Reporting and Alerts
- Remote Wiping
Management
- Usage Information
Administration
- Compliance
- Web Control
- Application Control
- Asset Management
- Device Control
Functionality
- System Isolation
- Firewall
- Endpoint Intelligence
- Malware Detection
Analysis
- Automated Remediation
- Incident Reports
- Behavioral Analysis
Absolute Secure Endpoint Categories on G2
Filter for Features
Scope
Endpoint Inclusiveness | Based on 18 Absolute Secure Endpoint reviews. Manages numerous endpoint types, including mobile, desktop, IoT, and wearable. | 96% (Based on 18 reviews) | |
Multi-OS Support | Supports diverse operating systems across several endpoint types. 19 reviewers of Absolute Secure Endpoint have provided feedback on this feature. | 90% (Based on 19 reviews) |
Security
Reporting and Alerts | Creates custom reports and alerts about security updates, existing or upcoming software licenses, data access, and more. This feature was mentioned in 21 Absolute Secure Endpoint reviews. | 93% (Based on 21 reviews) | |
Endpoint Protection | Protects employee, company, and data from potential vulnerabilities or malware. This feature was mentioned in 19 Absolute Secure Endpoint reviews. | 93% (Based on 19 reviews) | |
Remote Wiping | Remotely clears all data from compromised devices. 21 reviewers of Absolute Secure Endpoint have provided feedback on this feature. | 94% (Based on 21 reviews) |
Management
Device Enrollment | As reported in 20 Absolute Secure Endpoint reviews. Registers employee-owned or company-distributed devices for IT access. | 93% (Based on 20 reviews) | |
Device Configuration | Configures devices to seamlessly work with business-required applications, WiFi, VPN, etc. 18 reviewers of Absolute Secure Endpoint have provided feedback on this feature. | 94% (Based on 18 reviews) | |
Device Compliance | Based on 20 Absolute Secure Endpoint reviews. Ensures that employee devices are compliant with business regulations and requirements. | 98% (Based on 20 reviews) | |
Usage Information | Based on 21 Absolute Secure Endpoint reviews. Offers visibility into employee device activity. | 97% (Based on 21 reviews) | |
Data Separation | Based on 17 Absolute Secure Endpoint reviews. Separates personal data on devices from business-specific data. | 89% (Based on 17 reviews) |
Administration
Compliance | As reported in 40 Absolute Secure Endpoint reviews. Monitors assets and enforces security policies to audit assets and infrastructure security. | 89% (Based on 40 reviews) | |
Web Control | Based on 28 Absolute Secure Endpoint reviews. Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network. | 80% (Based on 28 reviews) | |
Application Control | Based on 30 Absolute Secure Endpoint reviews. Blocks endpoint users from accessing restricted applications. | 81% (Based on 30 reviews) | |
Asset Management | Keeps records of each network asset and its activity. Discovers new assets accessing the network. This feature was mentioned in 41 Absolute Secure Endpoint reviews. | 93% (Based on 41 reviews) | |
Device Control | As reported in 38 Absolute Secure Endpoint reviews. Manages user network accessibility on laptops and mobile devices. | 91% (Based on 38 reviews) |
Functionality
System Isolation | As reported in 35 Absolute Secure Endpoint reviews. Cuts off network connection or temporarily inactivate applications until incidents are remedied. | 89% (Based on 35 reviews) | |
Firewall | Protects endpoint devices from a variety of attacks and malware threats. This feature was mentioned in 26 Absolute Secure Endpoint reviews. | 74% (Based on 26 reviews) | |
Endpoint Intelligence | Based on 33 Absolute Secure Endpoint reviews. Analysis for users to examine threat intelligence data specific to their endpoint devices. | 88% (Based on 33 reviews) | |
Malware Detection | Based on 25 Absolute Secure Endpoint reviews. Provides multiple techniques and information sources to alert users of malware occurrences. | 73% (Based on 25 reviews) |
Analysis
Automated Remediation | As reported in 30 Absolute Secure Endpoint reviews. Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | 81% (Based on 30 reviews) | |
Incident Reports | Based on 32 Absolute Secure Endpoint reviews. Produces reports detailing trends and vulnerabilities related to their network and infrastructure. | 89% (Based on 32 reviews) | |
Behavioral Analysis | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators. This feature was mentioned in 29 Absolute Secure Endpoint reviews. | 83% (Based on 29 reviews) |