Likelihood to Recommend I do think it is well worth the cost and consideration, especially if you are using it on devices containing electronic medical records, personal health information or personal privacy information or devices that contain proprietary information, critical business information or other information that needs to be securely protected. It can also be used to track a device (individual) as well if that is your goal. We use it as an extra precaution to track our mental health clinicians that do home visits. It allows us to keep track of their whereabouts, in case an issue arises at a client's home. We are able to send someone out to check or assist, alert emergency services or send law enforcement if a situation should arise.
Read full review It is mostly good in any area, since it allows you to have all your computers under supervision, displaying their status, the operating system they have, the status of their antivirus, when it was last reviewed, among more very complete functions for work teams in which there are several existing equipment in use
Read full review Pros I tracked a stolen computer all the way to Africa from USA and disabled it. I set up geofences with alerts. As soon as a computer got a wifi connection outside of our fences it would email me its current location. Absolute's persistent technology was helpful. -Even when a pawn shop would attempt to "wipe" a device before getting it online, as soon as it got online it notified me of the OS re-installation and current location. We could call authorities and they could recover the device for us. And they were happy it made their job easier and deterred the pawn shop from reselling stolen devices. Read full review Keep all your devices close at hand Notify in real time when a virus is detected when I want to enter a website Notify in real time when a virus is detected when checking an email and it is suspicious Helps to increase the performance of the equipment, eliminating junk files and/or applications that have not been used for a long time You can schedule a complete analysis of your computer to find out what state it is in and if any of the software files have a virus Show scan reports Read full review Cons I do not know where I would consider this product to be deficient in functionality, difficult to use or any major changes that needed to be addressed. I wish the pricing of this product was a little lower, but I do think it is well worth the cost and consideration, especially if you are using it on devices containing electronic medical records, personal health information or personal privacy information. Read full review Show all the services that can be paid for and list them right there within the software to decide to add them and pay for them, instead of appearing from time to time or when an action is performed and saying that for better optimization pay for a service extra Read full review Alternatives Considered I have only used Absolute Data and Device Security (DDS). It was recommended by my Dell sales rep. After reviewing the product info, and loading a demo, it became clear that this is what was needed to add to our existing security to protect us from information loss due to a data breach on our portable devices. I presented this solution to the appropriate departments, and they agreed that this was something well worth the investment.
Read full review This to be able to keep everything safe and secure, so that the information is well, and thus it is easier to counteract against viruses that could be presented at the software level
Read full review Return on Investment Recovery of stolen assets. After recovering a few devices and students becoming aware of Absolute being deployed, it had a prevention effect deterring additional theft. It deterred pawn shops from accepting our stolen machines. Read full review Help reduce the vulnerabilities of computers and keep them safe from the different viruses that could catch emails, websites, memories and other activities for which the organization uses computers Read full review ScreenShots Absolute Visibility Screenshots