Ivanti Endpoint Security for Endpoint Manager vs NinjaOne comparison

Cancel
You must select at least 2 products to compare!
Microsoft Logo
25,420 views|17,386 comparisons
91% willing to recommend
NinjaOne Logo
views| comparisons
92% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Ivanti Endpoint Security for Endpoint Manager and NinjaOne based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, VMware, ManageEngine and others in Unified Endpoint Management (UEM).
To learn more, read our detailed Unified Endpoint Management (UEM) Report (Updated: May 2024).
771,170 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Autopilot is the most valuable feature.""The initial setup is not complex.""Conditional access has helped us tailor and enforce our security policies in the mobile space.""I like how Microsoft Intune lets me lock down the email profile and make it accessible only on certain devices.""It has a useful device management feature.""The reporting and analytics features in Microsoft Intune have been a lifesaver.""A great solution for anyone wanting a modern endpoint device management solution.""The ability to switch between Affinity and non-Affinity enrollment is great."

More Microsoft Intune Pros →

"It provides security features for unified endpoint management.""The most valuable features of the solution are accessing the data through the mobiles and meeting with the compliance for security best practices.""The best part about Ivanti and Matrix 42 is that they are low-code solution builders with drag-and-drop capabilities regarding service management.""The solution's most valuable features are its patch management functionality and provisioning.""The key differentiator is that it manages mobile devices and laptops in the same console. Windows and Linux are on the same console. This is the only product that does this. It's really the best in the industry.""Patching and remediation are the strongest features.""The most valuable feature of Ivanti Endpoint Security for Endpoint Manager, which my company mainly uses, is patching. Another valuable feature of Ivanti Endpoint Security for Endpoint Manager is that it allows you to view the inventory list of the different machines."

More Ivanti Endpoint Security for Endpoint Manager Pros →

"NinjaOne has a feature where we can create custom scripts that we can run on devices remotely.""The tool's most valuable feature is third-party application updates.""The installation is easy, it only took two minutes.""NinjaOne's best feature is its monitoring.""The most relevant feature is the monitoring, which provides built-in tools for sending commands.""It just works as advertised and serves the purpose for which we got it.""Good at managing updates and for remote support.""The solution's most valuable feature is related to its remote access...I know that NinjaOne's technical support is good."

More NinjaOne Pros →

Cons
"It would help if administrators could pinpoint the exact location of a stolen device to help law enforcement retrieve it and apprehend the suspect.""It would be better if they can reduce the cost of the license.""It would be better if I could integrate it with my core group policy. I would like to have a group policy in my current environment, which has strict control, but those things are still missing. Although it has maximum compliance and security, it's not available on-premise.""Microsoft Intune lags market leaders, such as Apperian, in its MAM capabilities.""The closest Microsoft Intune can be to GPOs, the better. There needs to be more granularity on application deployments. However, they have done better recently with the application deployments.""There are a couple of issues with stability.""When somebody has a customized application or their own company's application, we cannot deploy that application.""The initial setup is a little bit complex."

More Microsoft Intune Cons →

"When you open a new mobile, you automatically come onboard the mobile on the Ivanti platform but it needs some improvements.""Ivanti Endpoint Security for Endpoint Manager's support provided to its users by the vendor is one area that needs to improve.""An area for improvement in Ivanti Endpoint Security for Endpoint Manager is reporting. It's lacking. For example, Ivanti Endpoint Security for Endpoint Manager reports should tell you if the agent is up to date, if the security patch is updated, etc.""The solution needs a complete overhaul or makeover. It gets stuck sometimes because they're focusing on the cloud UEM stuff rather than paying as much attention to that particular piece. The ease of use could be improved. It combines many different functionalities that you would need multiple servers like SCCM. If I wanted to train people, I’d move to a higher level from an Apache architect. There are five or six different products. So, training functional staff to use the product can be challenging because it can sometimes be cumbersome. Reporting is challenging. We use Avanti extraction to report off an endpoint. We don't use the reporting because of the need for more functionality, granularity, or customization.""If I want to integrate the solution with any other solution, pushing the policies from the Ivanti side is a bit tough.""One of the features that Ivanti could improve is patching for non-Windows settings, such as Linux and Ubuntu.""The product's blocking definition needs improvement."

More Ivanti Endpoint Security for Endpoint Manager Cons →

"The solution could improve by optimizing the internet connection being used.""NinjaOne's dashboard could be easier to use.""I would like to see more scripts for PowerShell commands.""I wish that they integrated it with more antivirus solutions. Currently, they only push Defender, but it doesn't really have integration with SentinelOne. It also didn't integrate with Trend Micro, which we were using previously. I would also like to have more control from the mobile app. As of now, I am able to see some performance values, but I can't see, for example, disk activity or disk performance values. If they can improve their app a little bit, it would help greatly. They can also improve the tech interface. If I assign certain techs to a bunch of specific machines, they only get those alerts that they're assigned to.""The NinjaOne distribution server is highly dependent on an active directory.""The graphical user interface could be improved.""Lacks sufficient integrations with other PSAs.""It can have more integrations with third-party providers, such as Deep Instinct. They do partner with certain antivirus or remote access tool partners, but they can increase their portfolio to have more choices."

More NinjaOne Cons →

Pricing and Cost Advice
  • "Consider the Microsoft Enterprise Mobility Suite rather than choosing specific sub-components, e.g. only Microsoft Intune."
  • "There is a cost benefit of using Microsoft Intune because of the packaging with other Microsoft products."
  • "Microsoft Intune is a cost effective choice. It is less expensive than other products on the market."
  • "The purchase of the product was handled by someone else."
  • "I have no comment on pricing of the solution."
  • "The product is offered as part of a Microsoft standard bundle. The pricing can be competitive to Airwatch, and Maas360."
  • "For Microsoft 365 E5 clients, cost is not an issue as this product is one of the benefits."
  • "The price of Intune is included with the license for Office 365, so we don't have to pay anything extra for it."
  • More Microsoft Intune Pricing and Cost Advice →

  • "Ivanti Endpoint Security for Endpoint Manager is more expensive than some of the products I've used. It follows module-based licensing, so it would be more costly if you had more modules. Your costs depend on what modules you need."
  • "On a scale of one to ten, where ten is the highest, and one is the cheapest, I rate its pricing a five."
  • "The licensing is based on assets for MDM or EM, where you need one license per asset. The license is annual, and it is not very expensive."
  • "The product is expensive."
  • "The solution is pretty expensive."
  • "On a scale from one to ten, where one is low and ten is high, I rate the solution's pricing ten out of ten."
  • More Ivanti Endpoint Security for Endpoint Manager Pricing and Cost Advice →

  • "We got a pretty good deal. It was fairly affordable."
  • "Its pricing is great."
  • "NinjaRMM uses a subscription model."
  • "We currently pay $1.20 per device on a monthly basis."
  • "It roughly costs $400 a month. It provides a good value because of the number of tools that you get in the solution. I would rate it a four out of five in terms of pricing. There are no additional costs other than the standard licensing fees."
  • "The pricing is reasonable and cheaper than ConnectWise."
  • "NinjaOne is a little expensive but is still cheaper than competitors like Acronis or Veeam."
  • "I rate the solution’s pricing a five out of ten, where one is the lowest and ten is the most expensive."
  • More NinjaOne Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Unified Endpoint Management (UEM) solutions are best for your needs.
    771,170 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes it… more »
    Top Answer:Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of… more »
    Top Answer: Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also… more »
    Top Answer:The most valuable features of the solution are accessing the data through the mobiles and meeting with the compliance… more »
    Top Answer:The solution is a bit complex. If I want to integrate the solution with any other solution, pushing the policies from… more »
    Top Answer:Our clients use the solution to manage or provide workers or employees access to the entity's data. The solution is very… more »
    Top Answer:NinjaOne helps us view the status of software patching, whether the PC is locked or unlocked.
    Top Answer:The product's pricing depends on the number of PCs or devices.
    Top Answer:NinjaOne's pricing and user interface needs improvement.
    Comparisons
    Also Known As
    Intune, MS Intune, Microsoft Endpoint Manager
    LANDesk Security Suite, Ivanti Endpoint Security
    Learn More
    Overview

    Microsoft Intune is a comprehensive cloud-based service that allows you to remotely manage mobile devices and mobile applications without worrying about the security of your organization’s data. Device and app management can be used on company-owned devices as well as personal devices.

    In an increasingly mobile workforce, Microsoft Intune keeps your sensitive data safe while on the move. Microsoft Intune makes it possible for your team members to work anywhere using their mobile devices. Microsoft Intune provides both the flexibility and the control needed for securing all your data on the cloud, no matter where the device with the data is located.

    Microsoft Intune Device Management Key Features

    With Microsoft Intune Device Management you can:

    • Ensure devices and apps are compliant with your security requirements.
    • Rapidly deploy and authenticate apps on all company devices.
    • Remotely access devices to troubleshoot issues or to remove data from them.
    • Generate reports for all devices in the system.
    • Monitor the way users access and share information to protect company information.
    • Set rules and configure settings on personal and organization-owned devices to access data and networks.
    • Create user groups and device groups, allowing you to rapidly access many users and devices simultaneously.

    Mobile Application Management

    Mobile application management in Intune is designed to protect your organization’s data at the application level.

    With Microsoft Intune Application Management you can:

    • Configure apps to run with specific settings enabled.
    • Update existing apps that are already on the device.
    • See reports on which apps are used and monitor their usage.
    • Selectively wipe organization data from apps.
    • Add mobile apps to user groups and devices.

    As part of Microsoft's Enterprise Mobility + Security (EMS) suite, Intune integrates with Microsoft Entra ID for access control and with Azure Information Protection for data protection. It also integrates with Microsoft 365 Applications.

    Reviews from Real Users

    Microsoft Intune stands out among its competitors for a number of reasons. Two major ones are its ability to secure all devices under its management and the flexibility that the solution offers its users.

    A computing services manager notes, "Its security is most valuable. It gives us a way to secure devices, not only those that are steady. We do have a few tablets and other devices, and it is a way for us to secure these devices and manage them. We know they're out there and what's their status. We can manage their life cycle and verify that they're updated properly."

    The head of IT engineering at a financial services company writes, "The one feature we find most useful is the Mobile Application Manager. There are two types: we have the complete MDM and the Mobile Application Manager (MAM). We don't give our users phones, it is their own personal phone, and we need to allow them to have access to the company details on their phone. We need to create a balance between their own personal data and the company data. We deploy the Mobile Application Manager for them so that we won't be able to interfere with their own personal data."

    Ivanti Endpoint Security for Endpoint Manager is a comprehensive security solution designed to protect endpoints and ensure the overall security of an organization's network. It combines the power of Ivanti Endpoint Manager with advanced security features to provide a robust defense against cyber threats.

    With Ivanti Endpoint Security, organizations can effectively manage and secure all endpoints, including desktops, laptops, servers, and mobile devices, from a single console. This centralized management approach simplifies security operations and allows for better visibility and control over the entire endpoint environment.

    One of the key features of Ivanti Endpoint Security is its advanced threat detection and prevention capabilities. It employs a multi-layered approach to identify and block known and unknown threats, including malware, ransomware, and zero-day attacks. Real-time threat intelligence and behavioral analysis help to proactively detect and mitigate potential security risks.

    In addition to threat detection, Ivanti Endpoint Security offers robust endpoint protection features. It includes advanced antivirus and anti-malware capabilities, as well as web filtering and application control, to prevent unauthorized access and ensure compliance with security policies. It also provides data encryption and secure remote access to protect sensitive information and enable secure remote work.

    Ivanti Endpoint Security also includes vulnerability management features to identify and remediate security vulnerabilities across endpoints. It scans for missing patches and updates, and automates the patching process to ensure endpoints are up-to-date and protected against known vulnerabilities.

    Furthermore, Ivanti Endpoint Security offers comprehensive endpoint compliance and auditing capabilities. It helps organizations meet regulatory requirements by providing detailed reports and audits on endpoint security posture. It also enables organizations to enforce security policies and configurations consistently across all endpoints.

    Ivanti Endpoint Security for Endpoint Manager is a powerful security solution that combines endpoint management and advanced security features to protect organizations from a wide range of cyber threats. Its centralized management approach, advanced threat detection capabilities, and comprehensive endpoint protection features make it an ideal choice for organizations looking to enhance their endpoint security posture.

    Introducing NinjaOne, the ultimate all-in-one solution for modern ninjas. This innovative product combines cutting-edge technology with sleek design to enhance your ninja skills like never before. With its lightweight and compact form factor, NinjaOne is perfect for stealthy missions and quick maneuvers. 

    Equipped with state-of-the-art sensors and advanced AI capabilities, it offers real-time tracking, precise motion detection, and intelligent analysis of your surroundings. The high-resolution display provides crystal-clear visuals, ensuring optimal visibility even in low-light conditions. 

    NinjaOne also features a built-in communication system, allowing seamless coordination with your team members. Its long-lasting battery ensures uninterrupted usage during extended missions. 

    Whether you're a seasoned ninja or just starting your training, NinjaOne is the ultimate companion to elevate your skills to new heights.

    Sample Customers
    Mitchells and Buzzers, Callaway
    Otkritie Bank, France T_l_visions, MBDA, 21st Century Oncology, Sealed Air Corporation, Granite School District, The Bunker, The MAC Services Group, Adams 12 Five Star Schools District, AlliedBarton Security Services, Mohawk Industries, Sun National Bank
    Status Pros, Mitchell and Company
    Top Industries
    REVIEWERS
    Financial Services Firm19%
    Computer Software Company18%
    Comms Service Provider10%
    Energy/Utilities Company6%
    VISITORS READING REVIEWS
    Educational Organization23%
    Computer Software Company12%
    Government7%
    Financial Services Firm7%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm12%
    Government11%
    Manufacturing Company8%
    REVIEWERS
    University18%
    Educational Organization18%
    Religious Institution9%
    Computer Software Company9%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Government6%
    University6%
    Manufacturing Company6%
    Company Size
    REVIEWERS
    Small Business38%
    Midsize Enterprise14%
    Large Enterprise48%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise33%
    Large Enterprise47%
    REVIEWERS
    Small Business29%
    Midsize Enterprise29%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise15%
    Large Enterprise66%
    REVIEWERS
    Small Business87%
    Midsize Enterprise13%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise21%
    Large Enterprise41%
    Buyer's Guide
    Unified Endpoint Management (UEM)
    May 2024
    Find out what your peers are saying about Microsoft, VMware, ManageEngine and others in Unified Endpoint Management (UEM). Updated: May 2024.
    771,170 professionals have used our research since 2012.

    Ivanti Endpoint Security for Endpoint Manager is ranked 7th in Unified Endpoint Management (UEM) with 7 reviews while NinjaOne doesn't meet the minimum requirements to be ranked in Unified Endpoint Management (UEM) with 14 reviews. Ivanti Endpoint Security for Endpoint Manager is rated 8.6, while NinjaOne is rated 8.0. The top reviewer of Ivanti Endpoint Security for Endpoint Manager writes "A security solution to manage devices with patching and remediation feature". On the other hand, the top reviewer of NinjaOne writes "A tool that helps with a lot of configurations and creates automation processes that work perfectly". Ivanti Endpoint Security for Endpoint Manager is most compared with BigFix, Tanium, Microsoft Defender for Endpoint, CyberArk Endpoint Privilege Manager and Trellix Endpoint Security, whereas NinjaOne is most compared with Atera, N-able N-central, Microsoft Configuration Manager, LogMeIn Central and ConnectWise Automate.

    See our list of best Unified Endpoint Management (UEM) vendors.

    We monitor all Unified Endpoint Management (UEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.