Absolute Software References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (3599)
    96+ References
  • 4.8 / 5.0 (1944)
    Verified13+ References
  • 4.8 / 5.0 (1677)
    Verified16+ References

Absolute Software Case Studies

  • Northern Gas Networks uses Absolute to protect £1.4m laptop investment

  • Storage Networking Industry Association eliminates device theft with Absolute

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References96 total
    About

    Code42 is not new to the cyber security scene but their approach to insider risk protection is. For nearly 20 years, they have been safeguarding the data of more than 50,000 organizations, including 18 of the world’s most valuable brands. And as their needs and the needs of their workforces have evolved, so have their data security solutions.

  • Reference Rating
    4.7 / 5.0
    Customer References13 total
    About

    Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current and historical state and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.

  • Reference Rating
    4.7 / 5.0
    Customer References16 total
    About

    Dtex Systems is a global insider threat protection company that prevents cyber security breaches originating within an organization while protecting employee privacy. Dtex gives enterprises unmatched visibility across all endpoints to stop intellectual property theft, malicious insider attacks and the accidental disclosure of sensitive materials. Its flagship micro-agent is the first truly lightweight, massively scalable and privacy-compliant solution that can be quickly deployed across thousands of company endpoints with no noticeable system or network impact.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked