Help Me Choose: Dell Endpoint Security Additional Offers
Absolute
Absolute eliminates dark endpoints. Patented Absolute Persistence® technology is already embedded in the firmware of Dell devices and can survivetampering , OS reinstalls, and hard drive wipes, providing unrivaled visibility and control of endpoints — whether they are on or off the network. Absolute gives customers the power to see, manage and secure every endpoint, everywhere.
VMware AirWatch
VMware AirWatch modernizes Windows system management and security across any use case – whether managing remote worker devices, employee-owned machines, corporate branch office deployments or special line of business terminals. AirWatch enables IT to deploy compliance policies and remediate vulnerabilities faster, install software reliably and quickly, and manage patches across devices on or off the domain. By combining traditional system management requirements with modern EMM efficiencies, AirWatch lowers the cost of managing Windows deployments; secures endpoints, appsand data on any network; and delivers peak user experience across any device.
Use VMware AirWatch
Absolute eliminates dark endpoints. Patented Absolute Persistence® technology is already embedded in the firmware of Dell devices and can survive
Monitor device , data, application and user activity- Assess device location and geofence devices to enforce physical boundaries
- Remediate uncontrolled device risk in minutes versus days
Lock down rogue devices or at-risk data- Neutralize threats and prove compliance
- Investigate and recover stolen devices
VMware AirWatch
VMware AirWatch modernizes Windows system management and security across any use case – whether managing remote worker devices, employee-owned machines, corporate branch office deployments or special line of business terminals. AirWatch enables IT to deploy compliance policies and remediate vulnerabilities faster, install software reliably and quickly, and manage patches across devices on or off the domain. By combining traditional system management requirements with modern EMM efficiencies, AirWatch lowers the cost of managing Windows deployments; secures endpoints, apps
Use VMware AirWatch
- to keep users productive, while simplifying device management and endpoint security for IT staff
- to lower the cost of managing Windows devices
- to secure endpoints, applications
and data on ANY network - to simplify IT
device management into a single pane of glass - to deliver a better user experience across corporate and BYO devices
Absolute eliminates dark endpoints. Patented Absolute Persistence® technology is already embedded in the firmware of Dell devices and can survive tampering , OS reinstalls, and hard drive wipes, providing unrivaled visibility and control of endpoints — whether they are on or off the network. Absolute gives customers the power to see, manage and secure every endpoint, everywhere.
Features by Edition
Technical Info
Monitor device , data, application and user activity- Assess device location and geofence devices to enforce physical boundaries
- Remediate uncontrolled device risk in minutes versus days
Lock down rogue devices or at-risk data- Neutralize threats and prove compliance
- Investigate and recover stolen devices
Features by Edition
Absolute Resilience | Absolute Control | Absolute Visibility | |
Reporting and Analytics | |||
Device policies with fixed and smart device groups | X | X | X |
Predefined and custom reports | X | X | X |
Hardware and software asset reports | X | X | X |
User activity (login, unlock, keyboard and mouse) | X | X | |
Security Reports | |||
Security Vitals report | X | X | X |
Custom security posture reports | X | X | |
Suspicious devices | X | X | |
Unauthorized software | X | X | |
OS updates and Internet browsing configuration | X | X | |
Anti-malware / missing anti-malware | X | X | |
Encryption status | X | X | |
Application detect and repair | |||
SCCM status | X | X | |
SCCM repair | X | ||
X | X | ||
X | |||
Call history/loss control reports | |||
Activation of devices | X | X | X |
Missing devices | X | X | X |
Device drift by username / device name | X | X | X |
X | X | X | |
Activation | X | X | X |
Event calling | X | X | X |
Alerts | X | X | |
SIEM Connector | X | X | |
Enhanced SIEM integration with RSA Analytics, HP ArcSight, and Splunk | X | X | |
Risk Response | |||
Data delete | X | X | |
Custom data delete policy | X | X | |
Delete all files | X | X | |
Lost or stolen - delete files and OS | X | X | |
Device end of life - delete all files, sector wipe, and OS | X | X | |
End of life data delete certificate | X | X | |
Device freeze with optional end user messaging | X | X | |
File list | X | X | |
Remote file retrieval | X | X | |
Endpoint Data Discovery (EDD) | |||
At-risk data detection, scoring, and reporting | X | ||
Custom and pre-built data discovery rules | X | ||
Devices with at-risk data in the cloud | X | ||
Geotechnology | |||
Device location and device location history | X | X | X |
Geofencing | X | X | |
Endpoint Investigations | |||
Security incident investigation | X | ||
Device theft investigation and recovery (some conditions apply) | X |
Technical Info
System requirements |
Absolute also offers solutions to track and secure Chromebooks and iOS devices in the Absolute cloud-based console. Ask your sales representative for more information. |
Absolute cloud-based console requirements |
|
Absolute eliminates dark endpoints. Patented Absolute Persistence® technology is already embedded in the firmware of Dell devices and can survive tampering , OS reinstalls, and hard drive wipes, providing unrivaled visibility and control of endpoints — whether they are on or off the network. Absolute gives customers the power to see, manage and secure every endpoint, everywhere.
Features by Edition (Ask your sales representative for regional availability)
ABSOLUTE VISIBILITY provides hardware, software and device location insights, plus Student Technology Analytics is also included to assess Chromebook usage and correlate against student performance.
Monitor device , data, application and user activity- Assess device location and geofence devices to enforce physical boundaries
- Remediate uncontrolled device risk in minutes versus days
Lock down rogue devices or at-risk data- Neutralize threats and prove compliance
- Investigate and recover stolen devices
Features by Edition (Ask your sales representative for regional availability)
FEATURES | Absolute Visibility | Absolute Resilience |
Hardware/Software Reporting | X | X |
Student Technology Analytics (Education Only) | X | X |
Policy Driven Alerts | X | X |
Device Location & History | X | X |
Geofencing | X | |
Device Freeze | X | |
End User Messaging | X | |
Theft Recovery & Investigations | X | |
Service Guarantee (Education Only) | X |
ABSOLUTE VISIBILITY provides hardware, software and device location insights, plus Student Technology Analytics is also included to assess Chromebook usage and correlate against student performance.
Features by Edition
Technical info
Why AirWatch for Windows 10?
Good for:
Mobile Device Management, Enterprise Mobility, Mobile Productivityand Enterprise Security
AirWatch Express | AirWatch Green | AirWatch Blue | |
MDM simplified. Visibility and control | Device, app and native email management | Device, app and native email management. Adds identity, content and browsing management | |
Mobile Device Management | X | X | X |
Container | X | X | |
VMware Boxer | X | ||
App Wrapping | X | ||
Browser | X | ||
Content Locker Standard | X | ||
Identity Manager | X |
Technical info
System requirements | Win10, iOS, Android, macOS, QNX, Windows CE, Chrome |
Other requirements | myAirWatch Console 8.0 or above; Dell Deployment Services for new installations |
Why AirWatch for Windows 10?
- The enterprise mobility platform that simplifies management and improves device security
- Unify management of all endpoints (Windows 10, Android, iOS, macOS and more)
- A multi-layered approach to security encrypts sensitive data and secures access while providing visibility and ensuring compliance
- Unify management across BYO, corporate-owned and line of business use cases
- Configure devices with email, apps, Wi-Fi, VPN, content, internet sites and more all over the air
- Automate processes with dynamic and intelligent policy engines to alleviate manual tasks
- Integrate with backend systems to make the most of existing investments
- The market Leader in enterprise mobility management (1)
Good for:
Mobile Device Management, Enterprise Mobility, Mobile Productivity