


Find out what your peers are saying about Microsoft, ManageEngine, Omnissa and others in Unified Endpoint Management (UEM).
| Product | Mindshare (%) |
|---|---|
| Microsoft Intune | 24.3% |
| Ivanti Endpoint Security for Endpoint Manager | 1.8% |
| ThinkUEM | 0.3% |
| Other | 73.6% |


| Company Size | Count |
|---|---|
| Small Business | 130 |
| Midsize Enterprise | 55 |
| Large Enterprise | 170 |
| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 3 |
| Large Enterprise | 5 |
Microsoft Intune is a cloud-based service designed for device management, security, and compliance. It supports automation and facilitates endpoint management for Windows, iOS, and Android devices, ensuring data protection and efficient policy enforcement.
Microsoft Intune offers seamless integration with tools like Windows Autopilot to automate device setup and deployment. Integrated with Azure Active Directory, it enhances policy management while providing robust reporting and analytics tools for compliance tracking. Despite its intuitive interface aimed at simplifying navigation and device security management, there are challenges such as compatibility issues with Linux and Mac, limited policy support for Android, and demands for better third-party integration. It's widely used for both corporate-owned devices and BYOD scenarios in dynamic IT environments.
What are the key features of Microsoft Intune?In industries such as finance and healthcare, Microsoft Intune is implemented to ensure data protection and compliance with regulatory standards. Manufacturing sectors utilize Intune for managing a distributed workforce across global locations, while educational institutions employ it to secure and manage devices in learning environments supporting both students and faculty.
Ivanti Endpoint Security for Endpoint Manager combines a powerful vulnerability database with cloud-based deployment, facilitating mobile and OS management while enhancing security.
The platform features efficient patch management, remote control, and data access via mobile devices. Its unified console supports asset tracking across Windows, Mac, and Android, improving security patching processes. With inventory management, low-code workflow builders, built-in compliance, and an appealing UI, it manages thousands of devices, though it requires improvements in mobile onboarding, agent troubleshooting, and non-Windows patching. Some challenges exist with policy integration and IT tool integration, while comprehensive training is essential due to its wide range of functionalities.
What are the key features of Ivanti Endpoint Security for Endpoint Manager?Ivanti Endpoint Security for Endpoint Manager is implemented across industries for enhanced security patching, mobile device management, and data compliance. Companies utilize its features for managing personal and corporate data separately to prevent data leaks and breaches. The system enables efficient management of device fleets, though Mac management has noted limitations.
ThinkUEM is a comprehensive unified endpoint management platform designed to streamline device management and enhance security for enterprises. Its capabilities align with modern IT infrastructure needs, enabling efficient oversight across devices and applications.
ThinkUEM provides a robust set of features tailored to improve device management processes, allowing IT administrators to efficiently implement policies, manage applications, and secure data. Its flexibility supports integration with diverse environments, making it suitable for organizations that require seamless management across multiple devices and platforms. With a focus on enhancing productivity and security, ThinkUEM equips businesses with the tools needed for effective endpoint oversight.
What are the key features of ThinkUEM?ThinkUEM is implemented in industries like healthcare and finance, where the need for managing a wide range of devices and securing data is paramount. In healthcare, it ensures compliance with regulations while managing mobile and stationary devices. In finance, it aids in securing sensitive information, supporting complex regulatory frameworks, and providing a trusted, flexible management solution.
We monitor all Unified Endpoint Management (UEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.