Absolute Software References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (3432)
    96+ References
  • 4.8 / 5.0 (1862)
    Verified13+ References
  • 4.8 / 5.0 (1508)
    21+ References

Absolute Software Case Studies

  • US Environmental Protection Agency saves money and protects data with Absolute

  • Absolute locates stolen PCs for General Services Administration, breaks up theft ring

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References96 total
    About

    Code42 is not new to the cyber security scene but their approach to insider risk protection is. For nearly 20 years, they have been safeguarding the data of more than 50,000 organizations, including 18 of the world’s most valuable brands. And as their needs and the needs of their workforces have evolved, so have their data security solutions.

  • Reference Rating
    4.7 / 5.0
    Customer References13 total
    About

    Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current and historical state and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.

  • Reference Rating
    4.7 / 5.0
    Customer References21 total
    About

    Attivo Networks, the leader in deception technology, provides an active defense for early detection, forensics, and automated incident response to in-network cyberattacks. The Attivo ThreatDefend™ Deception Platform provides a comprehensive and customer-proven platform for proactive security and accurate threat detection within user networks, data centers, clouds, and a wide variety of specialized attack surfaces. The portfolio includes expansive network, endpoint, application, and data deceptions designed to efficiently misdirect and reveal attacks from all threat vectors. Advanced machine-learning makes preparation, deployment, and operations fast and simple to operate for organizations of all sizes. Comprehensive attack analysis and forensics provide actionable alerts, and native integrations automate the blocking, quarantine, and threat hunting of attacks for accelerated incident response. The company has won over 50 awards for its technology innovation and leadership.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked