Absolute Secure Endpoint

Absolute Secure Endpoint

Absolute Software
+
+

Related Products

  • ManageEngine Endpoint Central
    2,482 Ratings
    Visit Website
  • NinjaOne
    3,945 Ratings
    Visit Website
  • Iru
    1,470 Ratings
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • ConnectWise Automate
    508 Ratings
    Visit Website
  • Rippling
    16,003 Ratings
    Visit Website
  • Syncro
    538 Ratings
    Visit Website
  • Addigy
    259 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ESET PROTECT Advanced
    2,195 Ratings
    Visit Website

About

Manage and secure your data, devices, and applications with an unbreakable connection to every endpoint — on or off your network. Absolute gives you unparalleled line-of-sight to your devices and data. The self-healing connection keeps critical applications such as SCCM, VPN, antivirus, and encryption present, healthy, and up-to-date. And sensitive data remains protected, even when accessed from outside your network. Maintain complete control of every endpoint, with a comprehensive library of automated, custom workflows — no scripting required. Reduce the load on your IT and security teams with pre-built commands for enforcing Windows updates, managing device configurations, and resolving issues — from helpdesk tickets to security events. Absolute is the only endpoint security solution factory-installed by every major PC manufacturer. Embedded in the BIOS of over half a billion devices, chances are, you already have it. All you have to do is activate it.

About

Senturo safeguards Apple, Chromebook, Windows, and Android devices against loss, theft, and unauthorized access with powerful location tracking, device monitoring, and advanced recovery tools, while enhancing mobile device and data security through robust remote security policies and actions such as remote lock to protect your fleet. IT Fleet location tracking Senturo’s intuitive global map view built on Google Maps lets you monitor your entire device fleet at a glance. Pinpoint the real-time location of any device or review its movement history over the past year, ensuring you stay informed and in control. Monitoring and incident detection Ensure your devices stay where they belong. With geofencing and IP whitelisting, you’ll receive instant email alerts if a device leaves your approved area or connects to an unauthorized network, keeping your assets secure. Multi-OS messaging Send critical updates or alerts to your entire fleet in seconds.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations that want to have complete control of their endpoints

Audience

Field Services, Healthcare, Professional services, Schools, Universities

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$25 per month
Free Version
Free Trial

Reviews/Ratings

Overall 4.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 4.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Absolute Software
Founded: 1993
Canada
www.absolute.com

Company Information

Senturo
Founded: 2021
United Kingdom
senturo.com

Alternatives

Alternatives

KACE by Quest

KACE by Quest

Quest Software
Hexnode UEM

Hexnode UEM

Mitsogo Inc

Categories

Categories

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Mobile Device Management (MDM) Features

Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support

Asset Tracking Features

Activity Tracking
Audit Trails
Barcoding / RFID
Checkout / Check-In
Depreciation Tracking
Disposal Tracking
Inventory Management
Location Tracking
QR Codes
Reservations
Service History

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

IT Asset Management Features

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
Inventory Management
IT Service Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Integrations

Axonius
BuilderX
Eway
Google
Jamf Pro
Lucidum
Meraki Systems Manager
Microsoft Intune
ThreatAware

Integrations

Axonius
BuilderX
Eway
Google
Jamf Pro
Lucidum
Meraki Systems Manager
Microsoft Intune
ThreatAware
Claim Absolute Secure Endpoint and update features and information
Claim Absolute Secure Endpoint and update features and information
Claim Senturo and update features and information
Claim Senturo and update features and information