Absolute Visibility is an adaptive endpoint security solution. It provides users with a persistent connection to all of their endpoints and the data they contain.
The vendor says, by maintaining a two-way connection with each device, users have the insight they need to assess risk and apply remote security measures so they can protect each endpoint and the sensitive data it contains. This insight is delivered through a cloud-based console that requires no additional IT…
N/A
Cisco Meraki SM
Score 9.8 out of 10
N/A
Cisco offers Meraki Systems Manager (SM), an enterprise mobility management platform supporting the monitoring, provisioning and securing of mobile devices across an enterprise network.
I do think it is well worth the cost and consideration, especially if you are using it on devices containing electronic medical records, personal health information or personal privacy information or devices that contain proprietary information, critical business information or other information that needs to be securely protected. It can also be used to track a device (individual) as well if that is your goal. We use it as an extra precaution to track our mental health clinicians that do home visits. It allows us to keep track of their whereabouts, in case an issue arises at a client's home. We are able to send someone out to check or assist, alert emergency services or send law enforcement if a situation should arise.
It is very helpful if you need to restrict the apps a student or employee can have on their device. I had teachers using Netflix on the iPads before I brought them under management. Restricting them will make you unpopular with some of your employees, however, I advise them the device is being provided for business use and, therefore we have the right and responsibility to manage it.
I tracked a stolen computer all the way to Africa from USA and disabled it.
I set up geofences with alerts. As soon as a computer got a wifi connection outside of our fences it would email me its current location.
Absolute's persistent technology was helpful. -Even when a pawn shop would attempt to "wipe" a device before getting it online, as soon as it got online it notified me of the OS re-installation and current location. We could call authorities and they could recover the device for us. And they were happy it made their job easier and deterred the pawn shop from reselling stolen devices.
I do not know where I would consider this product to be deficient in functionality, difficult to use or any major changes that needed to be addressed.
I wish the pricing of this product was a little lower, but I do think it is well worth the cost and consideration, especially if you are using it on devices containing electronic medical records, personal health information or personal privacy information.
Limited ability for "command line" functions. For example, we had a laptop that was stolen and showed to be online, but we could not wipe it. We were able to access a command prompt, but it would not accept DISKPART or FORMAT commands to try and make the PC unusable.
The GPS location is not terribly accurate and frequently it "guesses" location based off of an IP address rather than actually activating the GPS on the device. This makes tracking lost/stolen devices very difficult.
Difficulty getting devices to correctly show their status in the dashboard. For example, I can have a PC that is online and connected to the Internet, but shows to be offline in the dashboard. Only after refreshing many times would it indicate that the PC was actually online, thus allowing me to administer it.
It has is easy to use overall and is very powerful. The learning curve for the system is very small and I have found it easy to train members of our team to use it. It can fit any size organization and the support is excellent. The ROI is well worth it. If you have a multiplatform ecosystem, this tool is near perfect.
We have found that Cisco Meraki has always had very good customer support. In the rare case, when we have needed assistance they have always been quick to respond and solve the issue.
I have only used Absolute Data and Device Security (DDS). It was recommended by my Dell sales rep. After reviewing the product info, and loading a demo, it became clear that this is what was needed to add to our existing security to protect us from information loss due to a data breach on our portable devices. I presented this solution to the appropriate departments, and they agreed that this was something well worth the investment.
The only product I have used that is similar is Apple Configurator. While a powerful solution, it requires physical access to the devices which is not always possible, especially on a large site. Meraki is able to achieve many of the same functions as the Apple configurator but without ever needing to physically access the device, other than initial setup and registration.
It’s scalable up to a point and will scale well from small to a medium business, however, as a business grows and policies get more mature or detailed, you might have to later upgrade to a more appropriate enterprise solution such as MaaS360 or AirWatch. This solution however, will last quite a long tome for a growing business.
Our immediate take away has been a savings of thousands a year in MDM fees. We were paying around $3.00 a device with our previous MDM and our average with Meraki is about $1.88 per device. That while providing far more functionality than our previous provider.