Absolute Data & Device Security (DDS)

(2)
5.0 out of 5 stars

Absolute Data & Device Security (DDS) allows organizations to persistently track and secure all of their endpoints within a single cloud-based console. Computers and ultra-portable devices such as netbooks, tablets, and smart phones can be remotely managed and secured to ensure—and most importantly prove—that endpoint IT compliance processes are properly implemented and enforced.

Work for Absolute Data & Device Security (DDS)?

Learning about Absolute Computrace?

We can help you find the solution that fits you best.

Absolute Data & Device Security (DDS) Reviews

Ask Absolute Computrace a Question
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • Industry
Ratings
Company Size
User Role
Industry
Showing 2 Absolute Computrace reviews
LinkedIn Connections
Absolute Computrace review by Tyler W.
Tyler W.
Validated Reviewer
Review Source

"Absolute"

What do you like best?

Absolute allows you to track where your devices are in real time. If you have remote sales reps, it helps to know where the device is, especially if it is stolen. You can also view all of the software on the device. You can lock it remotely, wipe it, or send a message to it.

What do you dislike?

The price points. It can get expensive to manage a fleet of computers

Recommendations to others considering the product

Consider what you need it to do. Absolute offers lots of features, but it comes at a price.

What business problems are you solving with the product? What benefits have you realized?

It helped to know what devices we have in production. It also helps track software and verifies only licensed company software has been installed.

Sign in to G2 Crowd to see what your connections have to say about Absolute Data & Device Security (DDS)
Absolute Computrace review by Executive Sponsor in Marketing and Advertising
Executive Sponsor in Marketing and Advertising
Validated Reviewer
Review Source

"Great software !"

What do you like best?

I love the aesthetic of the software and it’s navigability

What do you dislike?

Up till now I do not dislike anything I think this is a great platform

What business problems are you solving with the product? What benefits have you realized?

It is helping me revamp my business and help ensure the security of our domains

What Endpoint Management solution do you use?

Thanks for letting us know!

There are not enough reviews of Absolute Data & Device Security (DDS) for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
LogMeIn Central Logo
LogMeIn Central
(107)
Helping people and businesses access their digital lives from virtually anywhere, on any device.
2
Kaspersky Endpoint Security Logo
Kaspersky Endpoint Security
(66)
Kaspersky Endpoint Security for Business offers a tightly integrated combination of superior security technologies and far-reaching systems management capabilities, which can all be controlled via a single management console.
3
Panda Security Logo
Panda Security
(47)
Panda Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.
4
Trend Micro Endpoint Security Logo
Trend Micro Endpoint Security
(38)
Trend Micro Endpoint Security provides immediate protection for enterprise endpoints lowering infections by instantly securing end-points from sophisticated cybercriminal attacks
5
Cb Protection Logo
Cb Protection
(30)
Cb Protection is a next-generation endpoint threat prevention solution to deliver a portfolio of protection policies, real-time visibility across environments, and comprehensive compliance rule sets in a single platform.
6
Symantec Endpoint Encryption Logo
Symantec Endpoint Encryption
(15)
Protect sensitive information and ensure regulatory compliance with strong full-disk and removable media encryption with centralized management.
7
IBM BigFix Logo
IBM BigFix
(14)
Lack of visibility and control makes you vulnerable to security breaches and financial loss. The question is no longer if you'll be breached but when. IBM BigFix lets you find, fix, and secure endpoints. Fast.
8
Check Point Endpoint Security Logo
Check Point Endpoint Security
(11)
Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection.
9
Endpoint Protection Logo
Endpoint Protection
(5)
Comodo provides Advanced Endpoint Protection Solution for Small Medium Enterprise that solve malware problem quickly with complete security from known and unknown threats from automatic containment and crowd-sourced intelligence knowledge base.
10
Ivanti Security Suite Logo
Ivanti Security Suite
(5)
Enable IT to protect your data without compromising user productivity. Endpoint security integrated with systems management helps you reduce risk and gain control over your environment.
Show more
Kate from G2 Crowd

Learning about Absolute Data & Device Security (DDS)?

I can help.
* We monitor all Absolute Data & Device Security (DDS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.