12 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 7.8 out of 100
18 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 8.9 out of 100

Feature Set Ratings

    Endpoint Security

    Absolute

    Feature Set Not Supported
    N/A
    9.4

    Check Point Harmony Endpoint

    94%
    Check Point Harmony Endpoint ranks higher in 7/7 features

    Anti-Exploit Technology

    N/A
    0 Ratings
    10.0
    100%
    2 Ratings

    Endpoint Detection and Response (EDR)

    N/A
    0 Ratings
    10.0
    100%
    2 Ratings

    Centralized Management

    N/A
    0 Ratings
    10.0
    100%
    2 Ratings

    Hybrid Deployment Support

    N/A
    0 Ratings
    8.0
    80%
    2 Ratings

    Infection Remediation

    N/A
    0 Ratings
    9.0
    90%
    2 Ratings

    Vulnerability Management

    N/A
    0 Ratings
    9.0
    90%
    2 Ratings

    Malware Detection

    N/A
    0 Ratings
    10.0
    100%
    2 Ratings

    Attribute Ratings

    • Absolute is rated higher in 1 area: Likelihood to Recommend

    Likelihood to Recommend

    9.5

    Absolute

    95%
    2 Ratings
    9.0

    Check Point Harmony Endpoint

    90%
    3 Ratings

    Likelihood to Recommend

    Absolute

    I do think it is well worth the cost and consideration, especially if you are using it on devices containing electronic medical records, personal health information or personal privacy information or devices that contain proprietary information, critical business information or other information that needs to be securely protected. It can also be used to track a device (individual) as well if that is your goal. We use it as an extra precaution to track our mental health clinicians that do home visits. It allows us to keep track of their whereabouts, in case an issue arises at a client's home. We are able to send someone out to check or assist, alert emergency services or send law enforcement if a situation should arise.
    Read full review

    Check Point Software Technologies

    [Check Point Harmony Endpoint Security (formerly Sandblast Agent) is well suited for] customers having less IT resources and need to handle multiple locations where physical IT persons present is not possible[.] Also roaming users are accessing organization resources from BYOD devices[.] Check Point [Harmony Endpoint Security (formerly Sandblast Agent)] suits perfect as they use compliance ,encryption and all together firewall feature sets. Also sometime for roaming users its become not possible to download threat database for them its perfectly suit as we can provide them signature update with external file which they can simply put in their computer as database.
    Read full review

    Pros

    Absolute

    • I tracked a stolen computer all the way to Africa from USA and disabled it.
    • I set up geofences with alerts. As soon as a computer got a wifi connection outside of our fences it would email me its current location.
    • Absolute's persistent technology was helpful. -Even when a pawn shop would attempt to "wipe" a device before getting it online, as soon as it got online it notified me of the OS re-installation and current location. We could call authorities and they could recover the device for us. And they were happy it made their job easier and deterred the pawn shop from reselling stolen devices.
    Read full review

    Check Point Software Technologies

    • Requires authorized passwords and logins from end users.
    • Utilizes voiceprint recognition to validate users.
    • Allows for a one time login from end users working remotely away from their desks.
    Read full review

    Cons

    Absolute

    • I do not know where I would consider this product to be deficient in functionality, difficult to use or any major changes that needed to be addressed.
    • I wish the pricing of this product was a little lower, but I do think it is well worth the cost and consideration, especially if you are using it on devices containing electronic medical records, personal health information or personal privacy information.
    Read full review

    Check Point Software Technologies

    • Stability improvement require for communication with Endpoints
    • Cloud management console takes time to push rules on endpoint
    • Can integrate with API to authenticate users
    Read full review

    Pricing Details

    Absolute

    Starting Price

    Editions & Modules

    Absolute editions and modules pricing
    EditionModules

    Footnotes

      Offerings

      Free Trial
      Free/Freemium Version
      Premium Consulting/Integration Services

      Entry-level set up fee?

      Optional

      Additional Details

      Check Point Harmony Endpoint

      Starting Price

      Editions & Modules

      Check Point Harmony Endpoint editions and modules pricing
      EditionModules

      Footnotes

        Offerings

        Free Trial
        Free/Freemium Version
        Premium Consulting/Integration Services

        Entry-level set up fee?

        Optional

        Additional Details

        Alternatives Considered

        Absolute

        I have only used Absolute Data and Device Security (DDS). It was recommended by my Dell sales rep. After reviewing the product info, and loading a demo, it became clear that this is what was needed to add to our existing security to protect us from information loss due to a data breach on our portable devices. I presented this solution to the appropriate departments, and they agreed that this was something well worth the investment.
        Read full review

        Check Point Software Technologies

        I found that Check Point identified more Ransomware attacks than Kaspersky.
        Read full review

        Return on Investment

        Absolute

        • Recovery of stolen assets.
        • After recovering a few devices and students becoming aware of Absolute being deployed, it had a prevention effect deterring additional theft.
        • It deterred pawn shops from accepting our stolen machines.
        Read full review

        Check Point Software Technologies

        • It has enabled us to maintain privacy which has enhanced our highly rated brand standard. While basically it is a team member specific, behind the scenes program that protects systems from being used by unauthorized individuals, it contributes to the overall integrity of the organization which results in increased market share and return on investment for shareholders.
        Read full review

        Screenshots

        Add comparison