Microsoft Defender for Identity and Microsoft Defender Vulnerability Management compete in the security solutions category. Defender Vulnerability Management may have the upper hand with its extensive feature set catering to comprehensive security management.
Features: Microsoft Defender for Identity is valuable for real-time threat detection, behavioral analytics, and monitoring user activities. It integrates with other Microsoft Defender components, providing a cohesive identity security solution. On the other hand, Microsoft Defender Vulnerability Management offers accurate vulnerability assessments, complemented by features like compliance tracking and integration within broader security ecosystems.
Room for Improvement: Microsoft Defender for Identity could improve in providing more customizable alerts and enhancing its integration ease with non-Microsoft systems. Additionally, more granular controls for privilege management would be beneficial. Microsoft Defender Vulnerability Management could enhance its user interface, provide more in-depth training material, and offer greater integration flexibility with third-party platforms.
Ease of Deployment and Customer Service: Microsoft Defender Vulnerability Management integrates seamlessly with existing security infrastructures and provides dedicated support. Its detailed onboarding process ensures comprehensive setup. Microsoft Defender for Identity, however, is easier to set up, especially for organizations within the Microsoft ecosystem, and offers robust customer support focused around Microsoft solutions.
Pricing and ROI: Microsoft Defender for Identity offers a lower initial cost and quick ROI through smooth integration with Microsoft systems. In contrast, Microsoft Defender Vulnerability Management, though potentially higher in setup costs, delivers significant ROI by protecting enterprise environments from threats, supported by its comprehensive security capabilities.
As a Microsoft partner, we receive significant discounts, making the solution affordable for us.
The quality of support is very good, but troubleshooting can take time due to complex setups and the need to provide many logs.
Generally, the support is more effective than other providers like Oracle.
They are sometimes responsive, however, often issues cannot be reproduced on their end, making it challenging.
My team raised multiple support tickets for the product, and we were able to get responses from Microsoft support team.
Their response time and skill set are both good.
In a Microsoft-centric organization, especially with Azure infrastructure and Office 365, Microsoft Defender for Identity is scalable.
It is scalable; I evaluated the product and decided to use Defender on over 700 of our company servers.
Microsoft Defender for Identity is quite robust and built on Azure hyperscale infrastructure, with a 99% availability.
There are compatibility issues occasionally arising with false positives when other security tools are not whitelisted in Microsoft Defender.
It is very resource-intensive, consuming a lot of memory and CPU.
I would rate the overall stability as an eight.
One improvement I would recommend is the integration of an admin application within Teams, allowing easy access to attack information on a mobile platform.
Reducing false positives is something we've been working on with Microsoft.
There is room for improvement in delivering knowledge to technical users, especially regarding what we can gain from the solution and how to apply it.
A vulnerability I patch within 15 minutes takes 24 additional hours for an update.
The product is not stable; it often uses excessive memory and CPU, which makes it slow.
A potential improvement could be the introduction of a more advanced AI agent, possibly a large language model with better performance than the existing Microsoft Copilot.
the Microsoft Defender Suite is quite expensive, especially when integrated into Sentinel.
From an organization perspective, using E5 licenses is value for money, especially if Azure and Office 365 are already in use.
Ensuring a fair price according to market standards.
For non-partners, however, the cost could be seen as higher, between seven to ten.
Overall, every organization wishes for cheaper options, but we look at the security side as well, so we are good for now.
The pricing is reasonable, and it's included in the whole Microsoft E5 bundle, so it's all-inclusive.
The most valuable features of Microsoft Defender for Identity include its automatic remedies, possibilities for avoiding incidents, the privilege manager, and the generation of logs that facilitate a safer environment.
The integration into the Microsoft Defender ecosystem is the most valuable feature of Microsoft Defender for Identity.
The seamless integration with other Microsoft solutions within our Microsoft-centric environment is also a major advantage.
A valuable feature is the ease of management and integration with Microsoft products.
The recommendations, scores, and steps to remediate actions are highly useful.
It closes alerts with justifications based on historical data, thanks to integrated AI capabilities.
Microsoft Defender for Identity integrates with Microsoft tools to monitor user activity, providing advanced threat detection and analysis using AI. It enhances proactive threat response and security visibility, making it essential for securing on-premises and cloud environments like Active Directory.
Microsoft Defender for Identity offers comprehensive monitoring and AI-driven user behavior analysis. It detects threats through real-time alerts and identifies lateral movements and entity tagging, ensuring robust security management. With excellent visibility via its dashboard, it supports customized detection rules and seamlessly integrates with SIEM platforms. While SecureScore and SecureScan provide robust environment security, there is room for improvement in cloud security, on-premises application integration, and remediation capabilities. Azure integration is limited, and the administrative interface could be more user-friendly. Users experience frequent false positives, affecting threat detection efficiency.
What key features stand out in Microsoft Defender for Identity?In specific industries such as education and finance, Microsoft Defender for Identity is crucial for securing on-premises Active Directory and Azure Active Directory environments. It effectively detects suspicious activities and manages conditional access policies, offering user and entity behavior analytics, endpoint detection and response capabilities. This helps prevent unauthorized access and strengthens overall security, making it an invaluable asset for organizations aiming to safeguard their digital infrastructure.
Microsoft Defender Vulnerability Management enables organizations to identify vulnerabilities, manage patches, and fortify threat detection. It offers endpoint assessments, cloud incident management, and dynamic security through Microsoft's Security Scorecard integration.
Organizations leverage Microsoft Defender Vulnerability Management for advanced threat detection and response. It provides robust tools for vulnerability assessment and cloud incident management, integrated with Microsoft's Security Scorecard to enhance dynamic security profiling. Key features include automatic patch deployment, security configuration management, and seamless integration with Microsoft platforms, benefiting both on-prem and cloud environments. Organizations can track vulnerabilities with severity-based reports, helping manage outdated software and minimizing threat exposure.
What are the key features of Microsoft Defender Vulnerability Management?In healthcare, Microsoft Defender Vulnerability Management helps manage compliance with health regulations, while in finance, it aids in securing sensitive data from cyber threats. Manufacturing sectors benefit from its patch management, keeping operational technology systems less vulnerable to disruptions.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.