Try our new research platform with insights from 80,000+ expert users

Kandji vs Mimecast Incydr comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Zafran Security
Sponsored
Average Rating
9.6
Reviews Sentiment
7.8
Number of Reviews
6
Ranking in other categories
Vulnerability Management (16th), Continuous Threat Exposure Management (CTEM) (1st)
Kandji
Average Rating
7.0
Reviews Sentiment
7.7
Number of Reviews
1
Ranking in other categories
Vulnerability Management (47th), Mobile Device Management (MDM) (7th), Enterprise Mobility Management (EMM) (17th), Endpoint Detection and Response (EDR) (53rd)
Mimecast Incydr
Average Rating
9.0
Reviews Sentiment
7.4
Number of Reviews
78
Ranking in other categories
Data Loss Prevention (DLP) (24th)
 

Mindshare comparison

Vulnerability Management Market Share Distribution
ProductMarket Share (%)
Kandji0.1%
Wiz10.8%
Tenable Nessus8.0%
Other81.1%
Vulnerability Management
Data Loss Prevention (DLP) Market Share Distribution
ProductMarket Share (%)
Mimecast Incydr2.1%
Microsoft Purview Data Loss Prevention13.0%
Forcepoint Data Loss Prevention9.1%
Other75.8%
Data Loss Prevention (DLP)
 

Featured Reviews

Israel Cavazos Landini - PeerSpot reviewer
Weekly insights and risk analysis facilitate informed security decisions
I appreciate the weekly insights Zafran provides, which include critical topics for networks and IT security, allowing us to evaluate which insights apply to our environment. The organization score feature is valuable to keep the leadership team updated on how our infrastructure fares security-wise. The applicable risk level versus base risk level feature is beneficial because prior to Zafran, we only used the base risk level, but now understand that risk depends on the asset itself. Zafran is an excellent tool.
Amit-Sarkar - PeerSpot reviewer
An easy-to-manage and deploy solution, but it should provide open customization
You don't need a certification or great knowledge to manage and deploy the solution because it's not complex. It's a very easy plug-and-play solution where you can just enroll the devices and choose the features you want. Kandji doesn't require much customization because it has built-in features that we have to create manually otherwise.
Chuck_Mackey - PeerSpot reviewer
Provides comprehensive visibility and protection, helps in identifying the gaps in security, and comes with excellent onboarding support
In a couple of instances, we had a little bit of trouble in getting it distributed throughout the organization. We ultimately managed to do it, but they talk about it being a pretty simple process, and it became a little laborious. It would just turn away. The agents were not being distributed. It was just churning and churning and churning. When we were looking for specific categories of data, it was getting bogged down, but that was not even so much Code42, although some of it was their issue. It really has to do with the overall infrastructure and what the organization is prepared to do. If the infrastructure or the networking is a little hinky or you don't have a really finely tuned network infrastructure environment and your patches aren't up to date on your servers and your endpoints, it could get a little sticky. Other than that, it was okay. We really didn't have much problem beyond that. It took a couple of days to sort that out, but it was no big deal.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Overall, we have seen about eighty-seven percent reduction of the number of vulnerabilities that require urgency to remediate, specifically the number of criticals."
"We are able to see the real risk of a vulnerability on our environment with our security tools."
"Zafran has become an indispensable tool in our cybersecurity arsenal."
"We saw benefits from Zafran Security almost immediately after deploying it."
"Zafran is an excellent tool."
"It's a very easy plug-and-play solution where you can just enroll the devices and choose the features you want."
"It had the ability to preseed by sending in a data drive and could restore by sending the user a data drive."
"There are a couple of things. One of them is that they have what they call Incydr. Their detection and response solution to the insider threat area is called Incydr. That gives visibility to the clients that have widely dispersed employee bases due to work from home, or that had a dispersed workforce predating any of the work from home requirements. Even though they might not be inside the organization physically, they're inside the organization. It allows us to get some visibility into what people are doing, what the context is, and how to control what might be the potential for intellectual property theft or file exposure."
"The solution is very stable. Very rarely do we have any issues with it. We don't have to deal with bugs or glitches. It doesn't crash or freeze. We find it to be reliable."
"Backup and recovery have been great, but I love having the ability to keep the hybrid type build which they offer."
"Works in the background and users are able to perform restores."
"It has quite a bit of flexibility in configuring backup sets."
"t has a very user friendly status bar with common errors and has logs built in to the console so we can review the issues or status of CrashPlan."
"Security tools: Being able to monitor data going in and coming off our endpoints. Seeing what it is and where it's going is awesome."
 

Cons

"I think the ability to have some enhanced reporting capabilities is something they can improve on, as they have good reports but we have asked for some specific reporting enhancements."
"Initially, we were somewhat concerned about the scalability of Zafran due to our large asset count and the substantial amount of information we needed to process."
"The dashboarding and reporting functionality of Zafran Security is an area that definitely could use some improvements."
"Kandji should give open customization."
"There doesn't seem to be any feature that is lacking."
"The application, written in Java, required far more system resources on a Client than other solutions."
"More security would be nice, I would love to be able to remotely brick a stolen laptop and it's hard disk drive (HDD)."
"I would like to see more flexibility on privileges, perhaps create another kind of admin for regions. Also, I would like the ability to access logs without having to be on the actual device or a super-admin."
"You can't always filter out data that you'd like to."
"I think one we can improve is the compression."
"What I think could be improved is how I get support."
"Reporting could use an overhaul. It is very limited."
 

Pricing and Cost Advice

Information not available
"Users have to pay a yearly licensing fee for Kandji, which is expensive."
"It used to be a good solution for SOHO in particular as it had unlimited storage for a reasonable price. However, their pricing model has changed and they are now primarily targeting enterprise users."
"They were the best solution and surprisingly enough, the cheapest."
"The pricing is reasonable. It's my understanding that the cost is about $7 for unlimited storage in the cloud per server."
"It was expensive. It was more expensive than Eureka, and it was more expensive than Barracuda Backup, but what we got was a full team. They didn't come in and nickel and dime us. They provided the assistance we needed. They didn't say that they need to charge us for something or it is going to take another statement of work. It was all bundled into it... We pay for the software maintenance. It is probably 18% or 20% of the license fee for rev releases."
"It is 100% worth the cost to get and keep the support, especially when setting it up."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
866,561 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
10%
Manufacturing Company
7%
Government
6%
Computer Software Company
13%
Financial Services Firm
12%
University
8%
Manufacturing Company
7%
Manufacturing Company
11%
Computer Software Company
11%
Performing Arts
8%
University
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
By reviewers
Company SizeCount
Small Business24
Midsize Enterprise24
Large Enterprise30
 

Questions from the Community

What is your experience regarding pricing and costs for Zafran Security?
Since we stood Zafran Security up in our private cloud, we handle the maintenance on our side. As we opted not to use...
What needs improvement with Zafran Security?
In terms of areas for improvement, Zafran Security is doing a really great job as a new and emerging company. Oftenti...
What is your primary use case for Zafran Security?
My use cases for Zafran Security revolve around two primary areas. One is around vulnerability management and priorit...
What do you like most about Kandji?
It's a very easy plug-and-play solution where you can just enroll the devices and choose the features you want.
What is your experience regarding pricing and costs for Kandji?
Users have to pay a yearly licensing fee for Kandji, which is expensive.
What needs improvement with Kandji?
Kandji should have certification experience, which they don't have. Kandji should give open customization. Most custo...
What is your primary use case for Code42 Incydr?
Data Leakage Protection on large scale environments. This can be to protect against leakage on endpoints and servers ...
 

Also Known As

No data available
No data available
Code42 Next-Gen DLP, Code42 Next-Gen Data Loss Protection, Code42 Forensic File Search, Code42 Backup + Restore
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
Adobe, Okta, Samsung, Taylormade, Boston University, Lending Club, North Highland, Stanford University, Ping Identity, Qualcomm, Pandora.
Find out what your peers are saying about Tenable, Qualys, Wiz and others in Vulnerability Management. Updated: August 2025.
866,561 professionals have used our research since 2012.