Video Reviews
314 Absolute Secure Endpoint Reviews
Overall Review Sentiment for Absolute Secure Endpoint
Log in to view review sentiment.
Absolute gives us the ability to manage our laptop and desktop estate remotely, providing essential usage and security statistics. Geo-Location and IP reporting helps me keep track of asset locations.
Once installed it's baked into the BIOS so cannot be removed by anybody without authorisation. Even if the HDD is removed and replaced, Absolute will re-download itself and monitor the device!
It now comes with an optional suite of tools to recover your device after a malware attack or if unrecoverable a-la-crowdstrike! Very useful indeed Review collected by and hosted on G2.com.
There's nothing to dislike with the product; it does everything we need it to and more! What's more the product is continually being developed and new features are regularly added to improve our endpoint management. Review collected by and hosted on G2.com.
I like the fact that the product allows us the ability to track our devices and monitor our devices, along with auditing the devices as well. Built-in at a hardware level it provides the upmost support so that way the device is not completely lost out of our asset management system. the ability for the device to provide ailed information as well as sending commands to it provide a great ability for us to track and secure our devices. The deployment for the devices was not very difficult, once added with the serial number, the devices were able to be enrolled, some support documentation did take a little bit longer to review. However, the support documentations did lead to multiple pages which caused a little excessive reading, but it did provide the information that was needed. Once we did get the devices enrolled and call into the monitoring center, it just took a little bit of time for the devices to fully check in, it would be great to see more of a video walk-through of each set up of each device and how to guide because videos will answer a bunch more questions reading a set up guide. The devices are consistently tracked and check in 24 hours every day, or you can set the devices to check in sooner if you need them too. Review collected by and hosted on G2.com.
Some of the automated scripts are a little bit difficult to produce, and some of the scripts that should be standardized are not in the script library, you would have to make those yourself. Other software asset tracking systems and remote monitoring systems do have scrips built in that provide a simple and efficient means of monitoring and updating devices, whereas this product is not very strong in that area. Review collected by and hosted on G2.com.
Absolutes automation services are what really makes it stand out. Geo-tracking is extremely important, and when a system leaves the fenced area, we can have it frozen nearly immediately automatically. Additional plans even allow Absolute to regularly validate your security stack installed on end clients to make sure that it is installed, and up to date. All of this is extremely important in a world where more and more workers are remote or travelling. Review collected by and hosted on G2.com.
So far the only downside we have had is with getting the agents to check in initially. There is also sometimes a delay between when the system is detected outside of the geofence, and when that is reported to Absolute. It most has to do with the interval of the data transmission, and the Absolute team has been great at working with us on improving this service. Review collected by and hosted on G2.com.
Absolute Secure Endpoint provides a user friendly interface that is easy to navigate while also giving those with more experience the ability to use more complicated tools. Review collected by and hosted on G2.com.
Absolute Secure Endpoint is a bit too complicated when it comes to pushing scripts and programs, such as powershell scripts. Review collected by and hosted on G2.com.
- Ease of visibility of the endpoints.
- Ability to completely lock-out the computer
- The ability to recover even after re-imaging the computer.
- The ability to completely wipe the computer if lose or misplaced. Review collected by and hosted on G2.com.
- Inability to remotely control the computer in terms of RDP session. Review collected by and hosted on G2.com.
My department has used Absolute to flawlessly track down numerous lost and/or stolen devices. Review collected by and hosted on G2.com.
I have never had any issues with Absolute, so I cannot properly answer this question. Review collected by and hosted on G2.com.
Secure tracking and locking down of endpoints. Sensitive data reporting. Machine information and connection history. Review collected by and hosted on G2.com.
I wish that automations had more flexibility, for example, using automations with custom data points. Review collected by and hosted on G2.com.
Absolute is reliable in reporting on edpoint status. It gives us assurance that we will be able to track devices even if they are lost or stolen in a way that many other tools can't. Review collected by and hosted on G2.com.
Limited functionallity for making configuration changes such as installing new applications or patching. Review collected by and hosted on G2.com.
I tried everything I could to get around the Endpoint Protection provided by Absolute and it always kicked in and protected the machine from unauthorized use. Review collected by and hosted on G2.com.
Some features aren't available on older platforms, but if you're wanting to protect new assets, all the features will more than likely be available. Review collected by and hosted on G2.com.
What I like best about absolute secure endpoints is their effortless rollout in our organization, providing seamless integration and robust protection without disrupting existing workflows. the after-sales support has also been tremendously great. we use this product every day in our environment. Review collected by and hosted on G2.com.
There is not much to falter about this application other than there could be an improvement in the filtering of data. Review collected by and hosted on G2.com.