Absolute Secure Endpoint

Absolute Secure Endpoint

Absolute Software
+
+

Related Products

  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • NinjaOne
    4,573 Ratings
    Visit Website
  • Iru
    1,488 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • Rippling
    17,976 Ratings
    Visit Website
  • Addigy
    261 Ratings
    Visit Website
  • SuperOps
    216 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • Atera
    1,914 Ratings
    Visit Website

About

Manage and secure your data, devices, and applications with an unbreakable connection to every endpoint — on or off your network. Absolute gives you unparalleled line-of-sight to your devices and data. The self-healing connection keeps critical applications such as SCCM, VPN, antivirus, and encryption present, healthy, and up-to-date. And sensitive data remains protected, even when accessed from outside your network. Maintain complete control of every endpoint, with a comprehensive library of automated, custom workflows — no scripting required. Reduce the load on your IT and security teams with pre-built commands for enforcing Windows updates, managing device configurations, and resolving issues — from helpdesk tickets to security events. Absolute is the only endpoint security solution factory-installed by every major PC manufacturer. Embedded in the BIOS of over half a billion devices, chances are, you already have it. All you have to do is activate it.

About

Unless your current mobile security solution is capable of addressing the newer, more advanced threats that are built to jailbreak/root the device, you are vulnerable. The scary part is that just about every solution on the market fails to prevent these newer, more advanced threats. True mobile security needs to incorporate a containerization-based solution that isolates and encrypts the data being accessed and stored on the device and doesn’t rely on the Keystore for storing its crypto. Challenge any vendor with this mobile security requirements list below before committing to any solution. Full encryption of data on the device and full encryption of data being sent or received from the device using AES 256-bit encryption at a minimum. Containerized and encrypted isolation of all work-related emails, files, and apps from personal use. Encrypted transfer of data between apps on the device. Zero use of KeyStore for crypto key storage.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations that want to have complete control of their endpoints

Audience

Professionals and anyone searching for a solution to encrypt data and store crypto keys

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 4.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 4.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Absolute Software
Founded: 1993
Canada
www.absolute.com

Company Information

SyncDog
Founded: 2013
United States
www.syncdog.com/solutions/solutions-overview/

Alternatives

Alternatives

CryptoSentry

CryptoSentry

SentryBay
KACE by Quest

KACE by Quest

Quest Software

Categories

Categories

Integrations

Axonius
BuilderX
Eway
Lucidum
Matrix42 EgoSecure Data Protection
Microsoft 365
SecureAge Security Suite
ThreatAware

Integrations

Axonius
BuilderX
Eway
Lucidum
Matrix42 EgoSecure Data Protection
Microsoft 365
SecureAge Security Suite
ThreatAware
Claim Absolute Secure Endpoint and update features and information
Claim Absolute Secure Endpoint and update features and information
Claim SyncDog and update features and information
Claim SyncDog and update features and information