We performed a comparison between Citrix Endpoint Management and Sophos Mobile based on real PeerSpot user reviews.
Find out in this report how the two UEM (Unified Endpoint Management) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Its security is most valuable. It gives us a way to secure devices, not only those that are steady. We do have a few tablets and other devices, and it is a way for us to secure these devices and manage them. We know they're out there and what's their status. We can manage their life cycle and verify that they're updated properly."
"We have found the solution is capable of scaling."
"One of the most valuable aspects of Microsoft Intune is its seamless integration with Azure Active Directory, offering capabilities akin to Group Policy Objects."
"Intune provides full endpoint visibility and IT control across device platforms. You can individualize it for your company with the Intune Company Portal app."
"I like that we can implement conditional access."
"The technical support of Microsoft Intune is good."
"The Autopilot feature is fantastic. It is a Microsoft product, so it deals best with Microsoft operating systems, but it can integrate with iOS, Mac OS, Linux, and Android."
"Autopilot is the most valuable feature."
"A valuable feature of Citrix Endpoint Management is that it's stable. The stability is not a challenge among the move to the cloud."
"We have seen improvements in compliance management on the devices."
"One key feature is secure application delivery, which enables the secure delivery of mobile and web applications to end-user devices. This ensures data protection and compliance with corporate policies."
"The product is capable of acting in many different ways to help secure architecture."
"The MAM applications of the product are great."
"ShareFile, in particular, is valuable with its ease of sharing, and the best category security that is in the hands of users."
"The solution provides us with data protection."
"The utmost importance lies in mobile security and its performance."
"The initial setup process is straightforward and fast."
"The most valuable feature is the mobile device management capability. You can easily manage all of your mobile devices."
"I like the level of interaction that the product offers with the other products in our company's environment."
"One of the most valuable features of Sophos Mobile is the Wifi password."
"In terms of valuable features, we liked the lock feature, the roll-out white feature, and the find feature. I think that Sophos had a GPS locator, so you could figure out where the phone was from a GPS location."
"The solution is quite user-friendly."
"I would like the ability to install the agent on devices from suppliers, which would enable us to implement a zero-trust strategy for guest devices."
"It would be good if, in addition to the minimal patching and compliance, we could also use Intune for application deployment. For instance, if a device is not patched, Intune should have the ability to push not only a Microsoft patch but also other patches, such as a browser patch."
"Deploying an app can be a complex process due to dependencies."
"The documentation about the custom image setup could be better. Although Microsoft provides the steps to configure Intune or set up or deploy Intune, it doesn't have much information related to custom images. If you ask, "how can we deploy the custom image?" There is no information. The steps they mention ask you to connect to your on-premises environment or create your own image on the cloud itself once there is connectivity. But I needed to go to multiple websites to get all this information. I had to figure out how to upload the custom image if you want to use the on-premise custom image for Cloud PC. If you have the proper subscription, you must have the right access, like global admin or owner. Then you can add your custom image to that. There are no steps mentioned over there. Microsoft Intune doesn't have Chrome browser support. I would like to have that support because they will want it if we pitch the product to clients."
"There can be delays in the deployment of new policies."
"Technical support is not that great."
"I wanted to check if there is any provision at the Intune level to restrict certain things, such as a website, but unfortunately, that feature is available only in Microsoft Defender. Intune has web filtering capabilities, but they are only useful for protection from malicious websites, whereas we would like to be able to restrict a website. For example, YouTube is a clean website. No one would identify it as a malicious website, but if we want to stop the end-users from going to that website, we have to go for another product, such as Microsoft Defender or another third-party proxy solution. It would be great if this capability is included in Intune."
"Additional application deployment options e.g. MSI deployment with more complex parameters or additional side-by-side files, and non-MSI deployment options."
"Requires integrating with ABM before enabling some of the features."
"Citrix needs to improve the architecture. They also need to strengthen the application integration. They keep referring to some things to be required as security, and they keep selling the next level and on-premise separately. They should give the customer the opportunity to decide whether they want to use the next level on-premise or on-cloud, but they should not charge additional fees if the customer wants to deploy the next level on-premise because the customer is already being charged as the end user. They should allow next level on-premise optimization without any additional charges."
"Support for inventory management of Apple devices should be added."
"Citrix often depends on other services like backend data centers, network security, and application firewalls. Issues in these areas can be misinterpreted as Citrix issues by users."
"The tool’s battery usage was high."
"They continue to work on integration with mobile device management and mobile security. They are improving the protection but I think that the capabilities still need to be enhanced."
"There may be necessary adjustments that need to be made because we are facing certain restrictions within the work profile."
"In terms of what could be improved, the initial configuration and setup of the environment could probably be made a little bit easier. There are so many pieces that go into it. Intune is absolutely insane and Sophos is better, but it still is a bit complex to get it all set up correctly."
"It could be more secure."
"For Sophos Mobile, it is difficult to get good support."
"We encounter issues while working with iOS."
"We would like to see graphics showing the use of each device."
"Our support reps are based in the Philippines, and it's hard to connect with them sometimes. It took me about two months to resolve my issue, so it wasn't a good experience."
Citrix Endpoint Management is ranked 7th in UEM (Unified Endpoint Management) with 10 reviews while Sophos Mobile is ranked 9th in Enterprise Mobility Management (EMM) with 13 reviews. Citrix Endpoint Management is rated 8.2, while Sophos Mobile is rated 7.6. The top reviewer of Citrix Endpoint Management writes "Offers flexible application management that allows secure delivery of applications to endpoints, enabling users to operate applications on the go". On the other hand, the top reviewer of Sophos Mobile writes "Stable product with central administration to manage device security ". Citrix Endpoint Management is most compared with VMware Workspace ONE, MOBI, ManageEngine Endpoint Central, Cisco Meraki Systems Manager (MDM+EMM) and CyberArk Identity, whereas Sophos Mobile is most compared with Jamf Pro, ManageEngine Endpoint Central, VMware Workspace ONE, Lookout and IBM MaaS360. See our Citrix Endpoint Management vs. Sophos Mobile report.
We monitor all UEM (Unified Endpoint Management) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.