Listing Thumbnail

    Absolute Secure Endpoint (Private Offer Only)

     Info
    Deployed on AWS
    Absolute Secure Endpoint leverages the undeletable connectivity provided by Absolute Persistence to enable IT and security personnel to manage their devices, respond to security risks and protect sensitive data. This helps with IT asset management, strengthening security posture, maintaining compliance and responding effectively to IT or security incidents to limit downtime.

    Overview

    Open image

    Absolute Secure Endpoint empowers IT and Security teams to deliver cyber resilience across endpoints and applications and recover from unexpected downtime caused by ransomware, other cyber threats or IT issues.

    All major PC manufacturers including Dell, HP, Microsoft, and Lenovo embed Absolute Persistence technology in the firmware of their devices. Once activated, Persistence provides an undeletable tether across endpoints that is resistant to OS reimages, hard disk swaps and firmware updates. This empowers IT and Security teams with the visibility and cyber resilience needed to manage devices, address security gaps and recover from unexpected downtime.

    NOTE: For Private Offer and Channel Partner Private Offer (CPPO) inquiries please contact our marketplace team at marketplace-offers@absolute.com .

    Key capabilities:

    1. Absolute Persistence: Maintain undeletable connectivity to devices for unparalleled visibility.
    2. Application Resilience: Self-heal critical security apps such as EPP, EDR, DLP, SSE and others. Over 80 apps supported.
    3. Device Freeze: Quarantine lost, stolen or compromised devices to block malicious access.
    4. Geolocation and Geofencing: Locate devices and build geofences to be alerted when they breach approved boundaries.
    5. Endpoint Data Discovery: Identify files stored across devices containing sensitive data such as PII, financial information, customer data or corporate IP.
    6. File Delete and Device Wipe: Delete specific files, folders or the entire drive if necessary and obtain a sanitization certification for audits. Purge sensitive data before devices are decommissioned or reassigned to new users.
    7. Seamless and Proactive Patch Management: End-to-end streamlined patch management for OS and third-party applications including patch compliance reporting to monitor and reduce the time-to-patch.
    8. Remediation of Security Vulnerabilities through Automated Workflows: Continuous monitoring of security vulnerabilities. Responding with intelligent automation and workflows for remediation of vulnerabilities.
    9. Rehydrate: Remote restoration of compromised endpoints after a widespread IT or security incident such as ransomware to limit downtime to business operations.

    Absolute Secure Endpoint consists of the following five product editions:

    1. Absolute Visibility: Serves as your source of truth for devices, applications and sensitive data.
    2. Absolute Control: Provides you a lifeline to protect at-risk devices by taking remote action.
    3. Absolute Resilience: Delivers application self-healing and confident risk response.
    4. Absolute Resilience for Security: Proactively assess patch health for known operating system and software vulnerabilities.
    5. Absolute Resilience for Automation: Respond quicker to security vulnerabilities through automated workflows.

    Learn more about each product at https://www.absolute.com/platform/secure-endpoint  and https://www.absolute.com/platform/compare-absolute-products/ 

    Absolute Security is partnered with more than 28 of the worlds leading endpoint device manufacturers, embedded in the firmware of 600 million devices, trusted by thousands of global enterprise customers, and licensed across 16 million PC users. With the Absolute Security Cyber Resilience Platform integrated into their digital enterprise, customers ensure their mobile and hybrid workforces connect securely and seamlessly from anywhere in the world and that business operations recover quickly following cyber disruptions and attacks. Our award-winning capabilities have earned recognition and leadership status across multiple technology categories, including Zero Trust Network Access (ZTNA), Endpoint Security, Security Services Edge (SSE), Firmware-Embedded Persistence, Automated Security Control Assessment (ASCA), and Zero Trust Platforms.

    Highlights

    • Enforce Cyber Resilience: Assess security posture, maintain the uptime of security apps, and protect lost, stolen, or compromised devices. Rehydrate and recover devices back to a fully trusted and compliant state after an IT issue or cyberattack.
    • Mitigate Risks and Protect Data: Comply with data and security regulations, identify and protect sensitive data, and respond to endpoint risks and non-compliance.
    • Proactive & Automated Patch and Vulnerability Management: Assess OS & software patch health and respond quicker to security vulnerabilities through automated workflows.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Absolute Secure Endpoint (Private Offer Only)

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (3)

     Info
    Dimension
    Description
    Cost/12 months
    Secure Endpoint Visibility
    Absolute Secure Endpoint Visibility - Serves as your source of truth for device and application health. *Private Offer Only* MSRP $19.95
    $1,019.95
    Secure Endpoint Control
    Absolute Secure Endpoint Control - Provides you a lifeline to protect at-risk devices and data. *Private Offer Only* MSRP $39.95
    $1,039.95
    Secure Endpoint Resilience
    Absolute Secure Endpoint Resilience - Delivers application self-healing and confident risk response. *Private Offer Only* MSRP $59.95
    $1,059.95

    Vendor refund policy

    All orders are non-cancellable and all fees and other amounts you pay under this agreement are non-refundable.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    You can log a support ticket for any issues directly from the Secure Endpoint console or by contacting the Absolute support team at https://www.absolute.com/customers/support/contact/ . KB articles, documentation, and support level/SLA information are available at

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    403 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Odell D.

    Essential for Remote Device Management

    Reviewed on Nov 06, 2025
    Review provided by G2
    What do you like best about the product?
    I like that Absolute Secure Endpoint provides me with comprehensive visibility over my devices across the globe. It is reassuring to know the exact locations of my devices, which is especially crucial given the remote nature of many of our users. This visibility ensures that I can monitor and control the devices effortlessly, even when they are not physically within our infrastructure. The ability to track and manage devices remotely means that I can protect our assets by locking them if they are ever lost, stolen, or need to be decommissioned, providing an additional layer of security and control. It brings a sense of comfort and security knowing that I can act swiftly to protect sensitive information and minimize risks associated with device management.
    What do you dislike about the product?
    I find the check-in process for Absolute Secure Endpoint to be cumbersome. It sometimes takes 15 to 20 minutes, or even longer, especially if the device needs an internet connection to check-in. This delay can be frustrating and often requires me to perform a remote restart using Intune or other software to force the device to check-in. Additionally, the initial setup was challenging, as many aspects didn't make sense initially, requiring external assistance from a trainer provided by Dell. Having to rely on additional help for setup indicates the process could be more user-friendly and intuitive.
    What problems is the product solving and how is that benefiting you?
    I use Absolute Secure Endpoint to track device locations and ensure visibility for remote users. It allows me to lock or wipe devices remotely, providing peace of mind and control over devices outside my infrastructure.
    Law Practice

    Outstanding Geolocation Features, Loving the Experience So Far

    Reviewed on Oct 17, 2025
    Review provided by G2
    What do you like best about the product?
    The geolocation and monitoring of the devices are one of the best things we really appreciate to have
    What do you dislike about the product?
    We have just started but we are loving the tool so far that I can't see anything that I would dislike
    What problems is the product solving and how is that benefiting you?
    We are still in the process of deploying this agent to the devices in our inventory so I think one of the problems Absolute will help is that we would have monitoring setup for devices in our inventory also the use of Device wiping would help us with the problem where we have to reach out to another vendor for a proper wiping of devices
    Jonathan R.

    An excellent endpoint to work with

    Reviewed on Aug 12, 2025
    Review provided by G2
    What do you like best about the product?
    The topic of security with geolocation has helped us a lot, especially in cases where some clients do not pay for the service, as we can block the equipment. We have also had situations where they do not know where the equipment is or it has been stolen, and there we can do the blocking through the BIOS. Even if they erase it, the block remains, which is excellent.

    Personally, I haven't been using it for long, but what we have seen so far has worked very well. The use is very intuitive, and both the installation and implementation on the computers are quick and easy. We use it very frequently, and the management from the console is very user-friendly, especially for creating groups and managing the equipment among the different projects we handle.

    The software has several useful features, and the best part is that it integrates easily with our current operations. Also, when we raise tickets or requests, customer service has been very good, they always help us resolve doubts clearly and quickly.
    What do you dislike about the product?
    We understand that it is specialized software, we would like to have courses on the new tools that we manage to see as soon as we have questions.
    What problems is the product solving and how is that benefiting you?
    To have better management of the devices we administer (control, security, blocking, and geolocation, both on Mac and Windows)
    Mathew P.

    Reliable, Secure, and Easy to Use

    Reviewed on Aug 12, 2025
    Review provided by G2
    What do you like best about the product?
    I love the ability to remotely lock a PC when needed, which gives me peace of mind knowing devices are secure no matter where they are. The platform is very easy to use, with a clear and intuitive dashboard that makes it simple to check the status of each PC. Having this visibility and control in one place saves time and improves security management.
    What do you dislike about the product?
    So far, I have not found any significant downsides. It has performed reliably and met our needs without issues.
    What problems is the product solving and how is that benefiting you?
    Absolute Secure Endpoint helps us protect and manage devices no matter where they are. It solves the challenge of securing remote and mobile endpoints by allowing us to lock or wipe a device if it’s lost or stolen. The dashboard provides real-time visibility into device health and security status, which helps us respond quickly to potential risks. This has significantly improved our ability to safeguard company data and maintain compliance without adding extra administrative burden.
    Nicolas I.

    Endpoint Visibility and Control

    Reviewed on May 27, 2025
    Review provided by G2
    What do you like best about the product?
    Absolute gives us confidence that no matter where our devices are, they remain visible and under control. The persistence technology is unique — even if a machine is tampered with or reimaged, we still maintain connection. That kind of reliability has saved us time and reduced stress for our IT staff.
    What do you dislike about the product?
    The platform can feel a little complex when you first start using it. There are a lot of powerful options, which is great once you learn them, but it does take some ramp-up time before you feel completely comfortable navigating everything.
    What problems is the product solving and how is that benefiting you?
    For us the biggest issue was always losing track of laptops once they left the office. People travel, work from home, or just forget to check in, and we’d have almost no visibility until they came back on site. With Absolute we can still see those devices, check if they’re encrypted, patched, and in compliance without chasing people down. It’s saved a lot of back and forth with users and honestly gives us peace of mind knowing nothing is slipping through the cracks.
    View all reviews