Cybersixgill vs Microsoft Intune comparison

Cancel
You must select at least 2 products to compare!
Cybersixgill Logo
136 views|58 comparisons
100% willing to recommend
Microsoft Logo
25,420 views|17,386 comparisons
91% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Cybersixgill and Microsoft Intune based on real PeerSpot user reviews.

Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management.
To learn more, read our detailed Vulnerability Management Report (Updated: April 2024).
769,789 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"To be diligent for the customer, we usually go into Cybersixgill Investigative Portal to analyze and search things. The solution tells us the reputation of cyber threat actors. So, if someone has a reputation of one, it is a really bad idea to care about what that person is saying. However, if you find someone with a reputation of nine, then there is a high probability that we need to address the problem. You can get information about these type of actors in Cybersixgill Investigative Portal. They have a huge collection, which is like having the rules/goals of the dark web and deep web without having to go there. Our analysts avoid going dark web because they have Cybersixgill Investigative Portal and can get the news from their browser, searching wherever they want.""The advanced analysis has made our security operations more efficient. It has also potentially given us quicker access to data that we might not have otherwise located.""They also provide some of the greatest notification capabilities. I put in a customer's company name and domain names, or sometimes I put in their IP addresses as a keyword. Once Sixgill collects information that includes those keywords, they then provide us email notifications. That means we can catch information related to our customers as soon as possible.""The solution’s approach of using limited open source intelligence and focusing, instead, on the Deep Web and Dark Web is what seals the deal. That is why I like them. I have other tools that I can aggregate all the open source intelligence from. I value Cybersixgill because it provides access to things that no one else does."

More Cybersixgill Pros →

"It's really easy to access.""The ability to push applications on devices is valuable. You do not have to manually install applications one by one. If you like to use ten different applications, you do not have to manually go and download them one by one. Intune can compile a package for you, and then you can just push them from the admin center.""The reporting and analytics features in Microsoft Intune have been a lifesaver.""Among the most valuable features are the Company Portal that is built into Intune, and the update rings so that we can manage what types of future updates the devices get.""I like how Microsoft Intune lets me lock down the email profile and make it accessible only on certain devices.""We are using the mobile feature, and we are also using MDM to lock the devices, to push restrictions, et cetera""We can securely manage both company-owned devices and personal devices enrolled in our BYOD program.""Technical support, in general, has been quite helpful."

More Microsoft Intune Pros →

Cons
"Regarding their scraping abilities, things could be solidified. There are definitely improvements that could be made on the specificity for setting certain queries.""Sixgill has strong capabilities based on search queries, but there is some difficulty in using Sixgill. Their querying is very powerful but it can be difficult. It's not hugely complex but you need some skill to use Sixgill querying.""We need real-time updated information. If we could have this, it would be amazing. For example, if someone was posting something, then ten second later, it was on the platform. Sometimes, it takes a minute or hours right now, depending on the forum.""The breadth of access to data is good, but there are gaps. More data would be my suggestion because the platform is good and I have no complaints about the system. I think it is just a case of always trying to get more data sources."

More Cybersixgill Cons →

"There is no catalog for mobile access management (MAM) security.""While Intune works perfectly well, the only potential downside is that the deployment could be a bit complex for some users.""There are items that require improvements. One is the controls from iOS.""The UI is not user-friendly and has room for improvement.""We need the capabilities of the Cloud Management Gateway (CMG) to be enhanced through Intune instead of Azure.""In terms of what can be improved, I am looking for better enhancements regarding Apple management, not only on the mobile device, but also on the laptop.""Areas for improvement in Intune include expanding support beyond Samsung devices to accommodate other Android manufacturers like Redmi and Motorola.""I'm still playing around with it and haven't had any issues with the product yet, but support can definitely be improved."

More Microsoft Intune Cons →

Pricing and Cost Advice
  • "The pricing is cheap compared with Recorded Future. Sixgill's cost-effectiveness is very good."
  • "Sometimes, Cybersixgill Investigative Portal is cheaper than its competitors."
  • "The pricing and licensing are good. It is expensive for us because the US dollar is quite strong compared to our dollar. Otherwise, it is quite reasonable for what it is. All the tools in the market are around the same price from my experience."
  • More Cybersixgill Pricing and Cost Advice →

  • "Consider the Microsoft Enterprise Mobility Suite rather than choosing specific sub-components, e.g. only Microsoft Intune."
  • "There is a cost benefit of using Microsoft Intune because of the packaging with other Microsoft products."
  • "Microsoft Intune is a cost effective choice. It is less expensive than other products on the market."
  • "The purchase of the product was handled by someone else."
  • "I have no comment on pricing of the solution."
  • "The product is offered as part of a Microsoft standard bundle. The pricing can be competitive to Airwatch, and Maas360."
  • "For Microsoft 365 E5 clients, cost is not an issue as this product is one of the benefits."
  • "The price of Intune is included with the license for Office 365, so we don't have to pay anything extra for it."
  • More Microsoft Intune Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
    769,789 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes it easy to control security and manage the usage of mobile apps when you have a… more »
    Top Answer:Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of the things I like about it Pros: Protected productivity: Intune gives you the… more »
    Top Answer: Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also access to both Microsoft’s user community as well as around-the-clock customer… more »
    Ranking
    53rd
    Views
    136
    Comparisons
    58
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Views
    25,420
    Comparisons
    17,386
    Reviews
    74
    Average Words per Review
    787
    Rating
    8.4
    Comparisons
    Also Known As
    Intune, MS Intune, Microsoft Endpoint Manager
    Learn More
    Overview

    Sixgill’s fully automated threat intelligence solutions help organizations fight cyber crime, detect phishing, data leaks, fraud and vulnerabilities as well as amplify incident response in real-time. 

    Sixgill Investigative Portal empowers security teams with contextual and actionable alerts, along with the ability to conduct real-time, covert investigations:

      • Powered by the largest data lake of deep and dark web activity
      • Real-time actionable alerts customized to your organization
      • Quick deep dive into any escalation in real-time and gain a complete picture to understand the context.
      • Research threat actors profile, MO and history. Review and analyze across languages, sites, timeframes, types of products, topics, entities and more

      Microsoft Intune is a comprehensive cloud-based service that allows you to remotely manage mobile devices and mobile applications without worrying about the security of your organization’s data. Device and app management can be used on company-owned devices as well as personal devices.

      In an increasingly mobile workforce, Microsoft Intune keeps your sensitive data safe while on the move. Microsoft Intune makes it possible for your team members to work anywhere using their mobile devices. Microsoft Intune provides both the flexibility and the control needed for securing all your data on the cloud, no matter where the device with the data is located.

      Microsoft Intune Device Management Key Features

      With Microsoft Intune Device Management you can:

      • Ensure devices and apps are compliant with your security requirements.
      • Rapidly deploy and authenticate apps on all company devices.
      • Remotely access devices to troubleshoot issues or to remove data from them.
      • Generate reports for all devices in the system.
      • Monitor the way users access and share information to protect company information.
      • Set rules and configure settings on personal and organization-owned devices to access data and networks.
      • Create user groups and device groups, allowing you to rapidly access many users and devices simultaneously.

      Mobile Application Management

      Mobile application management in Intune is designed to protect your organization’s data at the application level.

      With Microsoft Intune Application Management you can:

      • Configure apps to run with specific settings enabled.
      • Update existing apps that are already on the device.
      • See reports on which apps are used and monitor their usage.
      • Selectively wipe organization data from apps.
      • Add mobile apps to user groups and devices.

      As part of Microsoft's Enterprise Mobility + Security (EMS) suite, Intune integrates with Microsoft Entra ID for access control and with Azure Information Protection for data protection. It also integrates with Microsoft 365 Applications.

      Reviews from Real Users

      Microsoft Intune stands out among its competitors for a number of reasons. Two major ones are its ability to secure all devices under its management and the flexibility that the solution offers its users.

      A computing services manager notes, "Its security is most valuable. It gives us a way to secure devices, not only those that are steady. We do have a few tablets and other devices, and it is a way for us to secure these devices and manage them. We know they're out there and what's their status. We can manage their life cycle and verify that they're updated properly."

      The head of IT engineering at a financial services company writes, "The one feature we find most useful is the Mobile Application Manager. There are two types: we have the complete MDM and the Mobile Application Manager (MAM). We don't give our users phones, it is their own personal phone, and we need to allow them to have access to the company details on their phone. We need to create a balance between their own personal data and the company data. We deploy the Mobile Application Manager for them so that we won't be able to interfere with their own personal data."

      Sample Customers
      Current customers include large enterprises, financial services, manufacturing, GSIs, MSSPs, government and law enforcement entities.
      Mitchells and Buzzers, Callaway
      Top Industries
      VISITORS READING REVIEWS
      Computer Software Company16%
      Financial Services Firm10%
      Manufacturing Company9%
      Government8%
      REVIEWERS
      Financial Services Firm19%
      Computer Software Company18%
      Comms Service Provider10%
      Energy/Utilities Company5%
      VISITORS READING REVIEWS
      Educational Organization23%
      Computer Software Company12%
      Government7%
      Financial Services Firm7%
      Company Size
      VISITORS READING REVIEWS
      Small Business37%
      Midsize Enterprise16%
      Large Enterprise47%
      REVIEWERS
      Small Business38%
      Midsize Enterprise14%
      Large Enterprise48%
      VISITORS READING REVIEWS
      Small Business20%
      Midsize Enterprise33%
      Large Enterprise47%
      Buyer's Guide
      Vulnerability Management
      April 2024
      Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management. Updated: April 2024.
      769,789 professionals have used our research since 2012.

      Cybersixgill is ranked 53rd in Vulnerability Management while Microsoft Intune is ranked 1st in Unified Endpoint Management (UEM) with 164 reviews. Cybersixgill is rated 8.8, while Microsoft Intune is rated 8.0. The top reviewer of Cybersixgill writes "Provides early detection of imminent attacks, and speeds up addressing of vulnerabilities internally because it makes them real". On the other hand, the top reviewer of Microsoft Intune writes "We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy". Cybersixgill is most compared with Recorded Future, ZeroFOX, Digital Shadows, Intel 471 and CyberInt Argos, whereas Microsoft Intune is most compared with Jamf Pro, VMware Workspace ONE, ManageEngine Endpoint Central, SOTI MobiControl and Microsoft Entra ID.

      We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.