Find out in this report how the two Microsoft Security Suite solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
As a Microsoft partner, we receive significant discounts, making the solution affordable for us.
There is a return on investment in terms of time-saving, control, and ease of manageability of the environment.
They are sometimes responsive, however, often issues cannot be reproduced on their end, making it challenging.
The support we receive from Microsoft is declining, and for example, after taking advanced support, we have not received satisfactory answers.
My team raised multiple support tickets for the product, and we were able to get responses from Microsoft support team.
They often refer to internal blogs, which doesn't offer much new information and can limit our capabilities in troubleshooting.
Tickets often bounce from person to person, requiring the sharing of information multiple times.
My teammates have had good communication with Microsoft.
It is scalable; I evaluated the product and decided to use Defender on over 700 of our company servers.
Since it is a cloud computing product, it can accommodate a range of company sizes, from a few users to large businesses.
There are compatibility issues occasionally arising with false positives when other security tools are not whitelisted in Microsoft Defender.
It is very resource-intensive, consuming a lot of memory and CPU.
I would rate the overall stability as an eight.
This scoring should be for specific industries as well. If I belong to the healthcare industry using Microsoft Defender Vulnerability Management, it should provide me with a risk score and show how I fare against the risk score of my industry.
A vulnerability I patch within 15 minutes takes 24 additional hours for an update.
The product is not stable; it often uses excessive memory and CPU, which makes it slow.
Microsoft has not offered control over how they calculate high or low-risk scenarios.
There is no write-back feature from the cloud to local, which would allow me to use my own credentials from the cloud tenant securely.
Identity protection and trust issues, particularly in hybrid environments, could be addressed better with Microsoft Entra ID Protection.
Overall, every organization wishes for cheaper options, but we look at the security side as well, so we are good for now.
For non-partners, however, the cost could be seen as higher, between seven to ten.
The pricing is reasonable, and it's included in the whole Microsoft E5 bundle, so it's all-inclusive.
Entra ID Protection is not badly priced, but some clients, especially in medium to smaller scale companies in third-world countries, find it quite expensive.
Microsoft Entra ID requires additional licensing components.
The pricing for Microsoft Entra ID protection is not expensive.
The main advantage of Microsoft Defender Vulnerability Management is that it can locate and prevent most threats even when the endpoints are not connected to the corporate network, as long as the internet is available.
The most valuable aspect is the kind of assessment results I get, and the recommendations provided in Microsoft products really help in taking care of the resources.
The integration with Sentinel has been one of the most valuable features for my organization.
Having a single sign-on feature with Entra ID ensures seamless access to various applications, even those with significant security constraints.
These features ease the job of security analysts, providing a better vision of user activities and potential risks.
The valuable features of Entra ID Protection include providing me visibility of my entire estate, managing access, and having a level of control.
Microsoft Defender Vulnerability Management enables organizations to identify vulnerabilities, manage patches, and fortify threat detection. It offers endpoint assessments, cloud incident management, and dynamic security through Microsoft's Security Scorecard integration.
Organizations leverage Microsoft Defender Vulnerability Management for advanced threat detection and response. It provides robust tools for vulnerability assessment and cloud incident management, integrated with Microsoft's Security Scorecard to enhance dynamic security profiling. Key features include automatic patch deployment, security configuration management, and seamless integration with Microsoft platforms, benefiting both on-prem and cloud environments. Organizations can track vulnerabilities with severity-based reports, helping manage outdated software and minimizing threat exposure.
What are the key features of Microsoft Defender Vulnerability Management?In healthcare, Microsoft Defender Vulnerability Management helps manage compliance with health regulations, while in finance, it aids in securing sensitive data from cyber threats. Manufacturing sectors benefit from its patch management, keeping operational technology systems less vulnerable to disruptions.
Microsoft Entra ID Protection enhances security with advanced identity controls and seamless integration across environments. It ensures robust protection via multifactor authentication and single sign-on capabilities, safeguarding enterprises' sensitive information efficiently.
Microsoft Entra ID Protection offers comprehensive identity management and privileged access management features, making it critical for businesses transitioning to hybrid models or cloud solutions. Utilizing multifactor authentication, single sign-on, and security policy creation, it excels in securing access across both on-premise and cloud platforms. By integrating with Microsoft Defender, it enhances security measures. While it is highly effective, areas for improvement include identity labeling, password management, and more straightforward third-party integrations. Expanding access to Mac devices and simplification of the licensing model are also areas to be addressed for improved scalability.
What are the key features of Microsoft Entra ID Protection?In industries such as finance and healthcare, entities leverage Microsoft Entra ID Protection to maintain stringent access controls, optimize privileged access management, and facilitate smooth transitions to cloud environments. They utilize its integration with Azure AD to ensure comprehensive identity protection while aligning to compliance requirements specific to their fields.
We monitor all Microsoft Security Suite reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.