Absolute Visibility is an adaptive endpoint security solution. It provides users with a persistent connection to all of their endpoints and the data they contain.
The vendor says, by maintaining a two-way connection with each device, users have the insight they need to assess risk and apply remote security measures so they can protect each endpoint and the sensitive data it contains. This insight is delivered through a cloud-based console that requires no additional IT…
N/A
Ivanti Endpoint Manager
Score 7.6 out of 10
N/A
Ivanti Endpoint Manager increases user and IT productivity by helping IT administrators gather detailed device data, automate software and OS deployments, and quickly fix user issues.
I do think it is well worth the cost and consideration, especially if you are using it on devices containing electronic medical records, personal health information or personal privacy information or devices that contain proprietary information, critical business information or other information that needs to be securely protected. It can also be used to track a device (individual) as well if that is your goal. We use it as an extra precaution to track our mental health clinicians that do home visits. It allows us to keep track of their whereabouts, in case an issue arises at a client's home. We are able to send someone out to check or assist, alert emergency services or send law enforcement if a situation should arise.
There is no direct replacement for the on-prem Ivanti [Unified Endpoint Manager (formerly LANDESK Management Suite)] solution. Ivanti has a companion product called Neurons, but that is in additional cost, and requires configuration with your on-prem [Unified Endpoint Manager] instance to perform basic functions. If cloud-based is a requirement for your organization, this is likely a dealbreaker. You can implement [Unified Endpoint Manager] in a cloud instance such as AWS, but the support for this appears limited. If on-prem is not an issue for you, this is a great tool for device management. It has robust features, impressive inventory, massive customization options, and excellent vendor support. If Patch Management is a problem in your company right now, this is the first product I would evaluate.
I tracked a stolen computer all the way to Africa from USA and disabled it.
I set up geofences with alerts. As soon as a computer got a wifi connection outside of our fences it would email me its current location.
Absolute's persistent technology was helpful. -Even when a pawn shop would attempt to "wipe" a device before getting it online, as soon as it got online it notified me of the OS re-installation and current location. We could call authorities and they could recover the device for us. And they were happy it made their job easier and deterred the pawn shop from reselling stolen devices.
Patch(Security) is done really well. You can use roll out projects or built-in automation as well as the use of groups and scopes to design pilot and other use cases.
It takes a solid inventory of what you have of your endpoints and can do an agentless scan as well if you need to collect data that way as well.
Provisioning is rather simple and even allows you to use other products' software for the image or the built-in if you wish to do so.
Software distribution works well and has a lot flexibility built into the module.
I do not know where I would consider this product to be deficient in functionality, difficult to use or any major changes that needed to be addressed.
I wish the pricing of this product was a little lower, but I do think it is well worth the cost and consideration, especially if you are using it on devices containing electronic medical records, personal health information or personal privacy information.
Setup - Boy it is a pain to configure everything correctly. Be aware that you'll probably be giving an AD service account some God rights to get everything working....and security just loves that....
Cost - Boy you have to pay for everything. I suppose it lets you buy into just what you want but having repeated items go through procurement is a pain if your procurement branch is a pain.
We are happy with the product but the support and development process is far superior to any other company we have worked with. Having a good support structure is very important in today's marketplace of products that do so many things and have so many robust options and capabilities. We are very satisfied with our contract, pricing, support and product execution.
Items are logically laid out and most are easy to find. The more advanced stuff can be trickier, but it is still not hard to find. There are a lot of options though, so remembering where some settings are, especially if you do not alter them often, can take a minute, but you will get to them fairly qiickly.
TRM\TAM support has been generally very good. Getting reported bug fixes, design changes, UX problems resolved has been a pain. It is often difficult to get problems escalated beyond the TRM\TAM level. Support is fantastic when you can get it, getting it can often require more work than it should, and that is probably our biggest issue.
I have only used Absolute Data and Device Security (DDS). It was recommended by my Dell sales rep. After reviewing the product info, and loading a demo, it became clear that this is what was needed to add to our existing security to protect us from information loss due to a data breach on our portable devices. I presented this solution to the appropriate departments, and they agreed that this was something well worth the investment.
It's been many years since I did a full evaluation of other products but at the time we purchased it, the main competitors were Microsoft's SMS and Alteris. SMS just looked horribly ugly and complicated (which fit in very well with Microsoft's other server tools) and Alteris looked okay but had a piecemeal approach where even a basic deployment meant purchasing a half dozen or more components. LANDesk had one bundle for all the tools we were looking for and had a great interface for presenting the data.