

Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
The time saved includes processes such as software installation, as previously we needed to take a user device remotely, but with Kandji, we can initiate software installation from the back end, which is a significant time saver.
We went from one hour for resolution time per device to 15 minutes, allowing us to save more than 50 hours of support time in a year.
I have seen a return on investment with Kandji, estimating that time saved is at least 20 to 30%, as individuals do not have to figure out which security updates to carry out themselves since the notification is pushed for them to review and install.
There was a specific issue that our other security tooling did not pick up, but XM Cyber did.
It's reduced the timescale to remediate vulnerabilities that are identified as representing a high risk.
The customer support at Kandji is phenomenal and is the best I have experienced from any vendor.
The customer support is the best I have ever seen.
You just go to the help section and can chat directly to get instant support.
The customer support is fantastic; it's probably some of the best we've received across all our security vendors.
Customer support for XM Cyber is good, responsive, and it follows up on issues.
Kandji's scalability is quite good, though I do see a concern once organizations start getting really large and need more flexibility.
I think Kandji is a perfect choice for growing small companies that become medium-sized or even bigger.
Kandji's scalability is perfect, as my organization grew from 180 to almost 300 devices with no bottlenecks.
Its scalability is great; it's easy to deploy and fully scalable.
We have not experienced any issues with scalability or reached its limits.
We have quite a complex and large IT estate, and we've certainly experienced no limitations or problems arising from the ability of XM Cyber's product to scale across that estate.
The simplicity and straightforwardness are its strongest attributes.
However, it often takes more than thirty minutes to execute the command, and sometimes it fails.
I hope there is an easier way to sandbox people's bring your own device devices because when we're doing SOC 2, it really wants us to sandbox things so that if someone were to take a device that is not ours, we could delete just our data off there and not theirs.
We push the boundaries with digital twins; I understand XM Cyber uses a similar concept of graph databases to map environments.
They could improve support because when we need to create a super case and escalate to resolve with technical support, they resolve our ticket in approximately two weeks.
The part that can be improved is the mobile exposure and the IBM i specific equipment.
It is cheap.
The pricing is not published publicly, requiring interaction with sales representatives for details.
While it might be on the expensive side compared to Jamf Pro, it is closer in pricing to other MDMs such as Microsoft Intune, which comes with the EMS E3 license.
We have a large, complicated estate, and in the licensing discussions, we were keen not to have the cost balloon because of the complication, the number of PCs and servers that we have.
Kandji has impacted my organization positively by definitely increasing security because it notifies you when an update is ready to be installed, and if you do not install it within a reasonable time frame, it would automatically install it.
It is reliable, a modern approach to managing Apple devices, and with features in blueprints, smart apps, and consistently reliable performance, I do not think Jamf really comes close.
The Auto Apps function is brilliant. It takes 20 seconds to push out a new app, and it automatically updates. This function really saves time.
Our loss exposure amount has reduced significantly, leading to two big wins: our loss exposure amount has gone down, and we have direct savings from focusing our team's time on what's important, allowing them to work on other business benefits and generate value for the company.
By far, the best feature of XM Cyber is being able to map out the way vulnerabilities can be exploited based on what they call the choke points in the network where the path that a bad actor would take comes closest to assets within our environment that are most vulnerable but also most valuable.
XM Cyber allows us to quantify the risk, and we are able to track remediation, so we can quantify the risk at an executive level and also to a technical IT team.
| Product | Mindshare (%) |
|---|---|
| Kandji | 0.4% |
| XM Cyber | 1.0% |
| Other | 98.6% |

| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 5 |
| Large Enterprise | 6 |
Kandji offers a comprehensive device management platform, ideal for managing Apple devices. Its intuitive interface and automation streamline device workflows, enhancing security and ease of use.
Kandji stands out with its efficient administration of iOS and Mac devices, featuring a user-friendly interface, exceptional support, and reliable management capabilities. The intuitive blueprinting aids in remote device management, while automated functions streamline workflows. Users benefit from time-saving features like app deployment and updates. Although it could improve its application suite, flexibility, and support for Windows and Android, it remains a favored choice for its ability to manage large-scale environments efficiently, automating updates and securing endpoints. Users appreciate the seamless setup and impactful operational management.
What are the standout features of Kandji?In industries focusing on Apple devices, Kandji proves invaluable. Its application in device administration, app deployment, policy enforcement, and endpoint security makes it a preferred MDM platform, offering solutions tailored to manage device enrollments and enhance security, thus supporting businesses in maintaining streamlined operations.
XM Cyber quantifies risk for different organizational levels, enhances patching by targeting choke points, and offers precise attack simulations, optimizing management time and vulnerability resolutions.
XM Cyber empowers organizations to identify significant risks by focusing on choke points and improving patching strategies. The platform excels in providing reliable and precise simulations, informing users about critical vulnerabilities without false positives. It enhances vulnerability management and internal reconnaissance, reducing loss exposure while supporting attack surface management. Users seek improved mobile exposure capabilities and IBM i specific solutions along with better visualization and AI integration.
What are the key features of XM Cyber?XM Cyber is deployed to manage risks in internet-exposed assets and hybrid cloud environments. Its implementation allows organizations to optimize IT resources by identifying vulnerabilities in critical attack paths, thus enhancing efficiency and supporting robust security strategies across industries.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.