


Tanium and Adaptiva are competing in the endpoint management and security space. Tanium seems to have an advantage due to its broad capabilities in comprehensive security coverage, despite Adaptiva's ease of use.
Features: Tanium provides real-time data collection, comprehensive security measures, and in-depth analytics. It also offers extensive integration capabilities. Adaptiva specializes in efficient system deployment, quick patch management, and simplicity. The difference highlights Tanium's complexity and Adaptiva's agility.
Ease of Deployment and Customer Service: Adaptiva provides a straightforward deployment path with efficient customer service, emphasizing quick onboarding. Tanium's deployment is more complex but benefits from support services that address intricate security needs. Adaptiva offers speed, while Tanium offers thoroughness.
Pricing and ROI: Tanium involves a higher setup cost but offers significant long-term ROI through its security features. Adaptiva has a more cost-effective initial setup, prioritizing quick returns and reduced operational burden. Tanium focuses on strategic investment, while Adaptiva emphasizes immediate, accessible deployment.
| Product | Mindshare (%) |
|---|---|
| Microsoft Intune | 26.0% |
| Tanium | 6.6% |
| Adaptiva | 1.7% |
| Other | 65.69999999999999% |

| Company Size | Count |
|---|---|
| Small Business | 124 |
| Midsize Enterprise | 53 |
| Large Enterprise | 167 |
| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 3 |
| Large Enterprise | 12 |
Microsoft Intune is a cloud-based service designed for device management, security, and compliance. It supports automation and facilitates endpoint management for Windows, iOS, and Android devices, ensuring data protection and efficient policy enforcement.
Microsoft Intune offers seamless integration with tools like Windows Autopilot to automate device setup and deployment. Integrated with Azure Active Directory, it enhances policy management while providing robust reporting and analytics tools for compliance tracking. Despite its intuitive interface aimed at simplifying navigation and device security management, there are challenges such as compatibility issues with Linux and Mac, limited policy support for Android, and demands for better third-party integration. It's widely used for both corporate-owned devices and BYOD scenarios in dynamic IT environments.
What are the key features of Microsoft Intune?In industries such as finance and healthcare, Microsoft Intune is implemented to ensure data protection and compliance with regulatory standards. Manufacturing sectors utilize Intune for managing a distributed workforce across global locations, while educational institutions employ it to secure and manage devices in learning environments supporting both students and faculty.
The Fastest, Most Scalable Endpoint Management and Security Platform in the World
On premises or via the cloud – manage your Windows endpoints no matter where they are. With solutions for Microsoft Configuration Manager, Microsoft Intune, and VMware Workspace ONE, Adaptiva solutions scale to hundreds of thousands of endpoints without impacting the network or business traffic.
Tanium offers robust endpoint protection, patching, and inventory management, consolidating the functions of tools like BigFix with capabilities in incident response, network security, and cloud or on-premise deployments.
Known for real-time capabilities, Tanium provides detailed analytics, security features, and device management. Users benefit from quick implementation, real-time updates, and patching campaigns. Despite its strengths, integration and custom plugin expansion remain areas to improve, along with data visualization and network optimization. Reporting enhancements and user training could advance its usability, and some UI elements may require updates for clarity and security.
What are the essential features of Tanium?Tanium's deployment spans industries focusing on endpoint protection and compliance, ensuring reliable device and server management in settings where safety and quick adaptation are critical. Organizations use it for application deployment, compliance checks, and integrating it as an EDR solution, enhancing overall security and operational efficiencies.
We monitor all Unified Endpoint Management (UEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.