Absolute Software References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (3499)
    96+ References
  • 4.8 / 5.0 (1890)
    Verified13+ References
  • 4.8 / 5.0 (936)
    Verified14+ References

Absolute Software Case Studies

  • currently locked
  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References96 total
    About

    Code42 is not new to the cyber security scene but their approach to insider risk protection is. For nearly 20 years, they have been safeguarding the data of more than 50,000 organizations, including 18 of the world’s most valuable brands. And as their needs and the needs of their workforces have evolved, so have their data security solutions.

  • Reference Rating
    4.7 / 5.0
    Customer References13 total
    About

    Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current and historical state and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.

  • Reference Rating
    4.7 / 5.0
    Customer References14 total
    About

    Virsec provides Zero Trust cybersecurity for legacy and modern workloads with the Virsec Security Platform (VSP). Using a default-deny, allow-on-trust security compensating control, VSP protects applications and workloads by proactively preventing cyber-attacks in milliseconds. VSP ensures only trusted code is allowed to run and stops everything else. With this proactive approach, workloads are immune to ever-evolving threat actor techniques and are protected against unpatched vulnerabilities.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked