Find out what your peers are saying about Microsoft, Omnissa, JAMF and others in Enterprise Mobility Management (EMM).
Product | Market Share (%) |
---|---|
IBM MaaS360 | 4.7% |
Microsoft Intune | 31.8% |
Workspace ONE UEM | 11.6% |
Other | 51.9% |
Product | Market Share (%) |
---|---|
Lookout | 24.9% |
Zimperium | 30.5% |
Check Point Harmony Mobile | 12.8% |
Other | 31.799999999999997% |
Company Size | Count |
---|---|
Small Business | 116 |
Midsize Enterprise | 45 |
Large Enterprise | 151 |
Company Size | Count |
---|---|
Small Business | 19 |
Midsize Enterprise | 7 |
Large Enterprise | 12 |
Company Size | Count |
---|---|
Small Business | 2 |
Large Enterprise | 5 |
Microsoft Intune provides centralized management of mobile devices and applications, ensuring security, compliance, and productivity through integration with Microsoft services like Microsoft 365 and Azure Active Directory.
Organizations use Intune for managing mobile devices and applications, enhancing security and compliance across platforms. With features like single sign-on, conditional access, and zero-touch deployment via Autopilot, it facilitates efficient operations. Intune's scalability, easy enrollment, and capabilities such as remote wipe support diverse device management, offering robust data protection and efficient operation. Despite its features, improvement areas include reporting, compatibility with non-Microsoft devices, and better support for macOS and Linux devices.
What are the key features of Microsoft Intune?
What benefits should users look for in reviews?
In industries such as finance, healthcare, and education, Microsoft Intune is implemented to ensure secure and compliant device management. Companies leverage its capabilities to deploy security policies and manage both corporate-owned and BYOD environments, facilitating a unified approach to data protection and compliance.
IBM MaaS360 is an EMM solution that allows you to configure devices for enterprise access and protect corporate data on smartphones and tablets – all from a single screen. As a robust integrated cloud platform, MaaS360 simplifies mobile device management (MDM) with visibility, rapid deployment, and control that spans across apps, mobile devices, and data. It also secures apps, laptops, smartphones, tablets, wearables, desktops, the Internet of Things (IoT) devices, and data so you can rapidly scale your remote workforce and bring your own device (BYOD) initiatives.
IBM MaaS360 can help you build a zero-trust strategy with modern device management. Deployment is so fast that in just a few clicks, IT admins can start enrolling devices and quickly manage the entire mobile device lifecycle. They can do everything from enrollment to enterprise integration, support, configuration and management, monitoring and security, analytics, and reporting.
IBM MaaS360 Features
IBM MaaS360 has many valuable key features. Some of the most useful ones include:
IBM MaaS360 Benefits
There are many benefits to implementing IBM MaaS360. Some of the biggest advantages the solution offers include:
Reviews from Real Users
MaaS360 stands out among its competitors for a number of reasons. Some of these include its mobile device and laptop management, robust security, and complete sync with Active Directory. PeerSpot users take note of the advantages of these features in their reviews:
Claudia G., a Cybersecurity Consultant at Telefónica, mentions, “My customers value the ability to control all their devices from a central point in IBM MaaS360. I rate IBM MaaS360 a nine out of ten.”
Okoro A.., a CEO at a ITANDT Solutions Limited notes, “The most valuable features are mobile device management and security (which allows you to quarantine infected devices).”
Lookout’s mobile EDR solution goes beyond traditional endpoint solutions by addressing the unique architecture, behaviors, and risks of iOS and Android devices. It provides industry-leading mobile threat defense on employee devices while also granting security teams the visibility and actionability needed to align mobile risk with traditional endpoint risk. By leveraging the world's largest AI-driven mobile security dataset, Lookout utilizes artificial intelligence (AI) and behavioral analysis to detect threats before they escalate, ensuring comprehensive protection for sensitive data and enabling secure mobile productivity.
Recognizing that employees using mobile devices are the new frontline, attackers are increasingly employing sophisticated social engineering techniques like phishing and smishing. These tactics exploit basic human instincts—trust, curiosity, and urgency—to trick users into revealing sensitive credentials, allowing threats to bypass traditional legacy security solutions. To combat this, Lookout provides AI-first protection against advanced social engineering attacks, device compromises, vulnerabilities, mobile malware, network threats.
We monitor all Enterprise Mobility Management (EMM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.