You must be logged in to access this page.
Save to My Lists
Optimized for quick response

Absolute Secure Endpoint Reviews & Product Details

Absolute Secure Endpoint Overview

What is Absolute Secure Endpoint?

The Absolute Secure Endpoint product portfolio leverages the unbreakable connection provided by Absolute Persistence® to enable IT and security personnel to monitor and address computers' problems and enables the computers and their mission-critical applications to self-heal. This helps with IT management, strengthening a company’s security posture, and maintaining compliance • Absolute Visibility collects data about the endpoints' location, security posture, and hardware/software inventory. It provides analysis of software and hardware utilization and identifies potential failure points and suspicious use patterns. • Absolute Control adds to these capabilities to control endpoints over the Internet, allowing for critical functions such as remote file deletion and data wipe, freezing devices on demand when at-risk, end user messaging, as well as establishing geo-fences and alerts. • Absolute Resilience adds further capabilities to secure endpoints from threats and vulnerabilities, respond to security breaches and incidents, and enable Application Resilience to automatically monitor and detect unhealthy applications and automatically heal them. • Absolute Ransomware Response is a standalone offering that enables organizations to assess their ransomware preparedness and cyber hygiene across endpoints; ensures mission-critical security applications such as anti-malware and device management tools remain healthy and capable of self-healing; and expedites the quarantine and recovery of endpoints if a ransomware attack occurs.

This product is included in:
Absolute Secure Endpoint Details
Product Website
Languages Supported
German, English, French, Italian, Japanese, Korean, Portuguese, Spanish, Chinese (Simplified)
Show LessShow More
Product Description

Absolute accelerates its customers’ shift to work-from-anywhere through the industry’s first self-healing Zero Trust platform, helping to ensure maximum security and uncompromised productivity. Absolute is the only solution embedded in more than half a billion devices, offering a permanent digital connection that intelligently and dynamically applies visibility, control and self-healing capabilities to endpoints, applications, and network access to help ensure their cyber resilience tailored for distributed workforces.

How do you position yourself against your competitors?

Absolute Secure Endpoint is the only endpoint security solution embedded in the firmware of over 600 million devices.


Seller Details
Company Website
Year Founded
1993
HQ Location
British Columbia, Canada
Twitter
@absolutecorp
3,978 Twitter followers
LinkedIn® Page
www.linkedin.com
1,078 employees on LinkedIn®
Ownership
TSE:ABT
Total Revenue (USD mm)
$197
Description

Absolute Security is partnered with more than
8 of the world’s leading endpoint device manufacturers, embedded in the firmware of 600 million devices, trusted by
1,000 global enterprises, and licensed across 14 million PC users. With the Absolute Security Cyber Resilience Platform integrated into their digital enterprise, customers ensure their mobile and hybrid workforces connect securely and seamlessly from anywhere in the world and that business operations recover quickly following cyber disruptions and attacks. Our award-winning capabilities have earned recognition and leadership status across multiple technology categories, including Zero Trust Network Access (ZTNA), Endpoint Security, Security Services Edge (SSE), Firmware-Embedded Persistence, Automated Security Control Assessment (ASCA), and Zero Trust Platforms. To learn more, visit www.absolute.com and follow us on LinkedIn, X, Facebook, and YouTube.


SG
Overview Provided by:

Absolute Secure Endpoint Integrations

(1)
Verified by Absolute Secure Endpoint

Recent Absolute Secure Endpoint Reviews

MK
Mike K.Mid-Market (51-1000 emp.)
5.0 out of 5
"Essential endpoint security and management"
Absolute gives us the ability to manage our laptop and desktop estate remotely, providing essential usage and security statistics. Geo-Location and...
AM
Adam M.Small-Business (50 or fewer emp.)
5.0 out of 5
"Simple, optimization, and employment for security and monitoring"
I like the fact that the product allows us the ability to track our devices and monitor our devices, along with auditing the devices as well. Built...
MK
mike k.Enterprise (> 1000 emp.)
5.0 out of 5
"Absolute EP"
Easy product to use. Good detections status. great overall product

Absolute Secure Endpoint Media

Official Downloads

Answer a few questions to help the Absolute Secure Endpoint community
Have you used Absolute Secure Endpoint before?
Yes

Video Reviews

314 Absolute Secure Endpoint Reviews

4.6 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
314 Absolute Secure Endpoint Reviews
4.6 out of 5
314 Absolute Secure Endpoint Reviews
4.6 out of 5

Absolute Secure Endpoint Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons

Overall Review Sentiment for Absolute Secure EndpointQuestion

Time to Implement
<1 day
>12 months
Return on Investment
<6 months
48+ months
Ease of Setup
0 (Difficult)
10 (Easy)
Log In
Want to see more insights from verified reviewers?
Log in to view review sentiment.
G2 reviews are authentic and verified.
MK
IT Support And Deployment Engineer
Hospital & Health Care
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review
(Original )Information
What do you like best about Absolute Secure Endpoint?

Absolute gives us the ability to manage our laptop and desktop estate remotely, providing essential usage and security statistics. Geo-Location and IP reporting helps me keep track of asset locations.

Once installed it's baked into the BIOS so cannot be removed by anybody without authorisation. Even if the HDD is removed and replaced, Absolute will re-download itself and monitor the device!

It now comes with an optional suite of tools to recover your device after a malware attack or if unrecoverable a-la-crowdstrike! Very useful indeed Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

There's nothing to dislike with the product; it does everything we need it to and more! What's more the product is continually being developed and new features are regularly added to improve our endpoint management. Review collected by and hosted on G2.com.

Recommendations to others considering Absolute Secure Endpoint:

Absolute offer a trial of their products, its well worth giving it a try. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

We have used absolute to track ongoing usage of devices, especially laptops. Those that have not been used for more than 30 days can be identified and the users contacted to establish why they haven't logged in. If there's no good reason then the laptop can be reclaimed and issued to a new member of staff. It's a great money saver as laptops aren't being left in drawers while we're buying new devices.

We also recently manage to recover a laptop that had been stolen and wiped then installed a new version of Windows. Absolute re-applied itself and checked in with a geo location. Info was passed to the police and device recovered. Review collected by and hosted on G2.com.

AM
IT Director
Small-Business(50 or fewer emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

I like the fact that the product allows us the ability to track our devices and monitor our devices, along with auditing the devices as well. Built-in at a hardware level it provides the upmost support so that way the device is not completely lost out of our asset management system. the ability for the device to provide ailed information as well as sending commands to it provide a great ability for us to track and secure our devices. The deployment for the devices was not very difficult, once added with the serial number, the devices were able to be enrolled, some support documentation did take a little bit longer to review. However, the support documentations did lead to multiple pages which caused a little excessive reading, but it did provide the information that was needed. Once we did get the devices enrolled and call into the monitoring center, it just took a little bit of time for the devices to fully check in, it would be great to see more of a video walk-through of each set up of each device and how to guide because videos will answer a bunch more questions reading a set up guide. The devices are consistently tracked and check in 24 hours every day, or you can set the devices to check in sooner if you need them too. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Some of the automated scripts are a little bit difficult to produce, and some of the scripts that should be standardized are not in the script library, you would have to make those yourself. Other software asset tracking systems and remote monitoring systems do have scrips built in that provide a simple and efficient means of monitoring and updating devices, whereas this product is not very strong in that area. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

Tracking our devices, that was the biggest reason why we went with this company. It's because we are able to track and monitor our devices, but we did have to end up using a corporate enterprise plan in order to get all of the features that we required. We did go through a third-party vendor in order to get the licenses assigned to our account however, that was a very simple process. I do wish that the platform did have an ability to track and monitor the devices without having the software removed from a small business standpoint. With a small business pricing option. Review collected by and hosted on G2.com.

JT
Patching and Deployment Engineer
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
(Original )Information
What do you like best about Absolute Secure Endpoint?

Absolutes automation services are what really makes it stand out. Geo-tracking is extremely important, and when a system leaves the fenced area, we can have it frozen nearly immediately automatically. Additional plans even allow Absolute to regularly validate your security stack installed on end clients to make sure that it is installed, and up to date. All of this is extremely important in a world where more and more workers are remote or travelling. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

So far the only downside we have had is with getting the agents to check in initially. There is also sometimes a delay between when the system is detected outside of the geofence, and when that is reported to Absolute. It most has to do with the interval of the data transmission, and the Absolute team has been great at working with us on improving this service. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

We need to ensure that the data on our systems does not leave the United States. Absolute's geo-fence helps to facilitate this with geo-gencing and the ability to remotely freeze devices so that the data is not accessable.

We currently have additional plans to use the remote wipe feature to ensure extra security measures are met when scrapping hardware that will no longer be used. Review collected by and hosted on G2.com.

NL
Information Systems Technician
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

Absolute Secure Endpoint provides a user friendly interface that is easy to navigate while also giving those with more experience the ability to use more complicated tools. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Absolute Secure Endpoint is a bit too complicated when it comes to pushing scripts and programs, such as powershell scripts. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

Absolute allows us to check the status of our devices, see what users are using them, and allows us to more accurately assist our users when they are having tech issues. Review collected by and hosted on G2.com.

LD
Infrastructure Analyst
Enterprise(> 1000 emp.)
Validated Reviewer
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

- Ease of visibility of the endpoints.

- Ability to completely lock-out the computer

- The ability to recover even after re-imaging the computer.

- The ability to completely wipe the computer if lose or misplaced. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

- Inability to remotely control the computer in terms of RDP session. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

Main priority is to address lost or stolen equipment. The ability to remotely wipe the computer ensures the data residing on the computer does not land on the hands of the threat actor. Review collected by and hosted on G2.com.

AN
Network Administrator
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

My department has used Absolute to flawlessly track down numerous lost and/or stolen devices. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

I have never had any issues with Absolute, so I cannot properly answer this question. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

With approximately 6,000+ devices across 14 campuses, it is difficult to keep track of every device. Absolute has allowed us to not only track down lost or stolen devices, but has also decreased the number of lost/stolen events happening. People are not fond of being found with stolen equipment and potential legal actions. Review collected by and hosted on G2.com.

Verified User in Hospital & Health Care
AH
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

Secure tracking and locking down of endpoints. Sensitive data reporting. Machine information and connection history. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

I wish that automations had more flexibility, for example, using automations with custom data points. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

We are able to lock down machines of remote workers if they are termed or temp workers. We are able to run reports of various types which has greatly helped us with asset management. Review collected by and hosted on G2.com.

Verified User in Higher Education
UH
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

Absolute is reliable in reporting on edpoint status. It gives us assurance that we will be able to track devices even if they are lost or stolen in a way that many other tools can't. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Limited functionallity for making configuration changes such as installing new applications or patching. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

Absolute allows us to monitor devices and enforce policies regarding location, security controls, and patching. Review collected by and hosted on G2.com.

CW
SR IT Systems Specialist
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

I tried everything I could to get around the Endpoint Protection provided by Absolute and it always kicked in and protected the machine from unauthorized use. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Some features aren't available on older platforms, but if you're wanting to protect new assets, all the features will more than likely be available. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

We are using Absolute Secure Endpoint to prevent unauthorized removal of equipment from our locations and prompt return of removed assets. Review collected by and hosted on G2.com.

CD
Team Leader: Customer Service Engineer
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Absolute Secure Endpoint?

What I like best about absolute secure endpoints is their effortless rollout in our organization, providing seamless integration and robust protection without disrupting existing workflows. the after-sales support has also been tremendously great. we use this product every day in our environment. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

There is not much to falter about this application other than there could be an improvement in the filtering of data. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

This application is solving the greatest problem in asset management by ensuring secure endpoints, which protect valuable data and resources from unauthorized access and cyber threats, thereby maintaining the integrity and efficiency of asset tracking and control. Review collected by and hosted on G2.com.