

Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
The time saved includes processes such as software installation, as previously we needed to take a user device remotely, but with Kandji, we can initiate software installation from the back end, which is a significant time saver.
We went from one hour for resolution time per device to 15 minutes, allowing us to save more than 50 hours of support time in a year.
I have seen a return on investment with Kandji, estimating that time saved is at least 20 to 30%, as individuals do not have to figure out which security updates to carry out themselves since the notification is pushed for them to review and install.
The customer support at Kandji is phenomenal and is the best I have experienced from any vendor.
The customer support is the best I have ever seen.
You just go to the help section and can chat directly to get instant support.
Their support is very good, and they respond quickly.
During the POC and the implementation, they were very available and made their best efforts to help us.
Whenever I've contacted them, they respond promptly with a callback or by email.
Kandji's scalability is quite good, though I do see a concern once organizations start getting really large and need more flexibility.
I think Kandji is a perfect choice for growing small companies that become medium-sized or even bigger.
Kandji's scalability is perfect, as my organization grew from 180 to almost 300 devices with no bottlenecks.
It is very simple; you just script it, and then the computers connect themselves.
When we attempted to scale this and update 200 systems, that just locked it.
We have some clients with up to a thousand agents.
There are some issues that they do not even know how to fix at this point.
I would rate the stability of Vicarius vRx ten out of ten.
There are some issues like high CPU usage during updates, but these were fixed.
The simplicity and straightforwardness are its strongest attributes.
However, it often takes more than thirty minutes to execute the command, and sometimes it fails.
I hope there is an easier way to sandbox people's bring your own device devices because when we're doing SOC 2, it really wants us to sandbox things so that if someone were to take a device that is not ours, we could delete just our data off there and not theirs.
I am pretty sure that the tool works great when it comes to Windows, but when you are in an environment that has different flavors of Linux at different version levels, that may pose an issue.
We have the ability to search across the network for all switches, routers, and printers, but some devices might be outdated and have vulnerabilities.
Enhancing Vicarius vRx with improved third-party integrations, like notifications for external systems, and increased cloud integration for richer instance information, would be valuable improvements.
It is cheap.
The pricing is not published publicly, requiring interaction with sales representatives for details.
While it might be on the expensive side compared to Jamf Pro, it is closer in pricing to other MDMs such as Microsoft Intune, which comes with the EMS E3 license.
It was very cheap.
In the past, Vicarius vRx was cheap, but now they have adjusted their pricing policy, resulting in higher renewal costs.
From a pricing perspective, Vicarius was cheaper compared to other competitors.
Kandji has impacted my organization positively by definitely increasing security because it notifies you when an update is ready to be installed, and if you do not install it within a reasonable time frame, it would automatically install it.
It is reliable, a modern approach to managing Apple devices, and with features in blueprints, smart apps, and consistently reliable performance, I do not think Jamf really comes close.
The Auto Apps function is brilliant. It takes 20 seconds to push out a new app, and it automatically updates. This function really saves time.
It's a valuable tool that reduces tension between IT and security teams by providing time to properly install patches.
The system prioritizes vulnerabilities, identifying high, medium, and low risks, allowing us to focus on high-risk applications.
The most valuable feature is the system's ability to provide information about open CVEs and how it compares the local version with available updates.
| Product | Mindshare (%) |
|---|---|
| Vicarius vRx | 0.9% |
| Kandji | 0.4% |
| Other | 98.7% |

| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 5 |
| Large Enterprise | 6 |
| Company Size | Count |
|---|---|
| Small Business | 11 |
| Midsize Enterprise | 7 |
| Large Enterprise | 3 |
Kandji offers a comprehensive device management platform, ideal for managing Apple devices. Its intuitive interface and automation streamline device workflows, enhancing security and ease of use.
Kandji stands out with its efficient administration of iOS and Mac devices, featuring a user-friendly interface, exceptional support, and reliable management capabilities. The intuitive blueprinting aids in remote device management, while automated functions streamline workflows. Users benefit from time-saving features like app deployment and updates. Although it could improve its application suite, flexibility, and support for Windows and Android, it remains a favored choice for its ability to manage large-scale environments efficiently, automating updates and securing endpoints. Users appreciate the seamless setup and impactful operational management.
What are the standout features of Kandji?In industries focusing on Apple devices, Kandji proves invaluable. Its application in device administration, app deployment, policy enforcement, and endpoint security makes it a preferred MDM platform, offering solutions tailored to manage device enrollments and enhance security, thus supporting businesses in maintaining streamlined operations.
Vicarius vRx automates patching and vulnerability mitigation with patchless protection, appreciated for effective third-party app patching and vulnerability prioritization. The platform offers streamlined management via intuitive dashboards, consolidating vulnerability discovery and remediation.
Vicarius vRx streamlines the patching and vulnerability mitigation process, delivering automation through patchless protection. It is favored for its ability to handle third-party applications effectively while providing vulnerability prioritization. The platform's intuitive dashboards allow for efficient management, consolidating vulnerability discovery and remediation efforts. Users note the robust scripting engine and supportive community as significant assets in mitigating critical threats, reducing manual effort and remediation time. Despite the strengths, enhancements in areas like automating patchless solutions, simplifying the login process, and refining networking vulnerability scanning capabilities are needed. The patch update process, reporting, and scripting functionalities require improvements. Name changes have resulted in some confusion, and additional filtering options are desired, along with better cloud integration and system feedback on update statuses. Logging options and mobile device management support are sought after by organizations.
What are the key features of Vicarius vRx?Managed service providers utilize Vicarius vRx for compliance needs, focusing on PCI and HIPAA requirements, vulnerability management, and patching. They use it extensively for patch management, covering both Microsoft and third-party updates, and for centralized update management. It aids in achieving visibility and automation, ensuring quick application of necessary patches across numerous assets while enhancing cybersecurity effectiveness with its network functionality and audit compliance features.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.