


Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP).


| Company Size | Count |
|---|---|
| Small Business | 148 |
| Midsize Enterprise | 59 |
| Large Enterprise | 176 |
| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 3 |
| Large Enterprise | 5 |
Microsoft Intune is a cloud-based service designed for device management, security, and compliance. It supports automation and facilitates endpoint management for Windows, iOS, and Android devices, ensuring data protection and efficient policy enforcement.
Microsoft Intune offers seamless integration with tools like Windows Autopilot to automate device setup and deployment. Integrated with Azure Active Directory, it enhances policy management while providing robust reporting and analytics tools for compliance tracking. Despite its intuitive interface aimed at simplifying navigation and device security management, there are challenges such as compatibility issues with Linux and Mac, limited policy support for Android, and demands for better third-party integration. It's widely used for both corporate-owned devices and BYOD scenarios in dynamic IT environments.
What are the key features of Microsoft Intune?In industries such as finance and healthcare, Microsoft Intune is implemented to ensure data protection and compliance with regulatory standards. Manufacturing sectors utilize Intune for managing a distributed workforce across global locations, while educational institutions employ it to secure and manage devices in learning environments supporting both students and faculty.
Absolute Secure Endpoint provides comprehensive endpoint protection designed to enhance cybersecurity by offering real-time visibility, control, and resilience for devices.
This advanced cybersecurity solution is ideal for IT environments, offering robust tools to protect data and devices in real time. Its capacity to ensure endpoint visibility ensures devices stay compliant and secure, avoiding threats and minimizing downtime. Absolute Secure Endpoint leverages self-healing capabilities to maintain consistent protection, increase operational efficiency, and improve IT resilience.
What are the key features of Absolute Secure Endpoint?Industries, including healthcare and finance, implement Absolute Secure Endpoint to secure critical information and maintain compliance with regulations. Its flexible deployment across diverse IT infrastructures supports sectors needing high-level data protection and device management.
Ivanti Endpoint Security for Endpoint Manager combines a powerful vulnerability database with cloud-based deployment, facilitating mobile and OS management while enhancing security.
The platform features efficient patch management, remote control, and data access via mobile devices. Its unified console supports asset tracking across Windows, Mac, and Android, improving security patching processes. With inventory management, low-code workflow builders, built-in compliance, and an appealing UI, it manages thousands of devices, though it requires improvements in mobile onboarding, agent troubleshooting, and non-Windows patching. Some challenges exist with policy integration and IT tool integration, while comprehensive training is essential due to its wide range of functionalities.
What are the key features of Ivanti Endpoint Security for Endpoint Manager?Ivanti Endpoint Security for Endpoint Manager is implemented across industries for enhanced security patching, mobile device management, and data compliance. Companies utilize its features for managing personal and corporate data separately to prevent data leaks and breaches. The system enables efficient management of device fleets, though Mac management has noted limitations.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.