Help Me Choose: Absolute Security and AirWatch Management

 
Absolute

Absolute eliminates dark endpoints. Patented Absolute Persistence® technology is already embedded in the firmware of Dell devices and can survive tampering, OS reinstalls, and hard drive wipes, providing unrivaled visibility and control of endpoints — whether they are on or off the network. Absolute gives customers the power to see, manage and secure every endpoint, everywhere.

  • Monitor device, data, application and user activity
  • Assess device location and geofence devices to enforce physical boundaries
  • Remediate uncontrolled device risk in minutes versus days
  • Lock down rogue devices or at-risk data
  • Neutralize threats and prove compliance
  • Investigate and recover stolen devices

VMware AirWatch

VMware AirWatch modernizes Windows system management and security across any use case – whether managing remote worker devices, employee-owned machines, corporate branch office deployments or special line of business terminals. AirWatch enables IT to deploy compliance policies and remediate vulnerabilities faster, install software reliably and quickly, and manage patches across devices on or off the domain. By combining traditional system management requirements with modern EMM efficiencies, AirWatch lowers the cost of managing Windows deployments; secures endpoints, apps and data on any network; and delivers peak user experience across any device.

Use VMware AirWatch

  • to keep users productive, while simplifying device management and endpoint security for IT staff
  • to lower the cost of managing Windows devices
  • to secure endpoints, applications and data on ANY network
  • to simplify IT device management into a single pane of glass
  • to deliver a better user experience across corporate and BYO devices
Absolute eliminates dark endpoints. Patented Absolute Persistence® technology is already embedded in the firmware of Dell devices and can survive tampering, OS reinstalls, and hard drive wipes, providing unrivaled visibility and control of endpoints — whether they are on or off the network. Absolute gives customers the power to see, manage and secure every endpoint, everywhere.

  • Monitor device, data, application and user activity
  • Assess device location and geofence devices to enforce physical boundaries
  • Remediate uncontrolled device risk in minutes versus days
  • Lock down rogue devices or at-risk data
  • Neutralize threats and prove compliance
  • Investigate and recover stolen devices

Features by Edition

Absolute ResilienceAbsolute ControlAbsolute Visibility
Reporting and Analytics
Device policies with fixed and smart device groups

X

X

X

Predefined and custom reports

X

X

X

Hardware and software asset reports

X

X

X

User activity (login, unlock, keyboard and mouse)

X

X

Security Reports
Security Vitals report

X

X

X

Custom security posture reports

X

X

Suspicious devices

X

X

Unauthorized software

X

X

OS updates and Internet browsing configuration

X

X

Anti-malware / missing anti-malware

X

X

Encryption status

X

X

Application detect and repair
SCCM status

X

X

SCCM repair

X

Bitlocker status

X

X

Bitlocker repair

X

 
Call history/loss control reports
Activation of devices

X

X

X

Missing devices

X

X

X

Device drift by username / device name

X

X

X

Bitlocker status

X

X

X

Activation

X

X

X

Event calling

X

X

X

Alerts

X

X

SIEM Connector

X

X

Enhanced SIEM integration with RSA Analytics, HP ArcSight, and Splunk

X

X

Risk Response
Data delete

X

X

Custom data delete policy

X

X

Delete all files

X

X

Lost or stolen - delete files and OS

X

X

Device end of life - delete all files, sector wipe, and OS

X

X

End of life data delete certificate

X

X

Device freeze with optional end user messaging

X

X

File list

X

X

Remote file retrieval

X

X

Endpoint Data Discovery (EDD)
At-risk data detection, scoring, and reporting

X

Custom and pre-built data discovery rules

X

Devices with at-risk data in the cloud

X

Geotechnology
Device location and device location history

X

X

X

Geofencing

X

X

Endpoint Investigations
Security incident investigation

X

Device theft investigation and recovery (some conditions apply)

X



Technical Info

System requirements
  • Windows 7, 8, 8.1, and 10 (32 and 64 bit)
  • Mac OS X 10.6 or later
  • Android 4.4.2 or later

Absolute also offers solutions to track and secure Chromebooks and iOS devices in the Absolute cloud-based console. Ask your sales representative for more information.
Absolute cloud-based console requirements
  • Windows Internet Explorer
  • Microsoft Edge (Windows 10)
  • Mozilla Firefox (Windows and Mac)
  • Google Chrome (Windows and Mac)
  • Safari (Mac)
Absolute eliminates dark endpoints. Patented Absolute Persistence® technology is already embedded in the firmware of Dell devices and can survive tampering, OS reinstalls, and hard drive wipes, providing unrivaled visibility and control of endpoints — whether they are on or off the network. Absolute gives customers the power to see, manage and secure every endpoint, everywhere.

  • Monitor device, data, application and user activity
  • Assess device location and geofence devices to enforce physical boundaries
  • Remediate uncontrolled device risk in minutes versus days
  • Lock down rogue devices or at-risk data
  • Neutralize threats and prove compliance
  • Investigate and recover stolen devices

Features by Edition
(Ask your sales representative for regional availability)

FEATURES Absolute VisibilityAbsolute Resilience
Hardware/Software Reporting X X
Student Technology Analytics X X
Policy Driven Alerts X X
Device Location & History X X
Geofencing  X
Device Freeze  X
End User Messaging  X
Theft Recovery & Investigations  X
Service Guarantee  X


ABSOLUTE VISIBILITY provides hardware, software and device location insights, plus Student Technology Analytics is also included to assess Chromebook usage and correlate against student performance.
Features by Edition

AirWatch ExpressAirWatch GreenAirWatch Blue
MDM simplified. Visibility and controlDevice, app and native email managementDevice, app and native email management. Adds identity, content and browsing management
Mobile Device Management

X

X

X

Container

X

X

VMware Boxer

X

App Wrapping

X

Browser

X

Content Locker Standard

X

Identity Manager

X



Technical info

System requirementsWin10, iOS, Android, macOS, QNX, Windows CE, Chrome
Other requirementsmyAirWatch Console 8.0 or above; Dell Deployment Services for new installations


Why AirWatch for Windows 10?

  • The enterprise mobility platform that simplifies management and improves device security
  • Unify management of all endpoints (Windows 10, Android, iOS, macOS and more)
  • A multi-layered approach to security encrypts sensitive data and secures access while providing visibility and ensuring compliance
  • Unify management across BYO, corporate-owned and line of business use cases
  • Configure devices with email, apps, Wi-Fi, VPN, content, internet sites and more all over the air
  • Automate processes with dynamic and intelligent policy engines to alleviate manual tasks
  • Integrate with backend systems to make the most of existing investments
  • The market Leader in enterprise mobility management (1)

Good for:

Mobile Device Management, Enterprise Mobility, Mobile Productivity and Enterprise Security