Microsoft Enterprise Mobility + Security vs RSA Identity Governance and Lifecycle comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Microsoft Enterprise Mobility + Security and RSA Identity Governance and Lifecycle based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, JAMF, VMware and others in Enterprise Mobility Management (EMM).
To learn more, read our detailed Enterprise Mobility Management (EMM) Report (Updated: April 2024).
768,886 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The reporting and analytics features in Microsoft Intune have been a lifesaver.""Autopilot is the most valuable feature of Microsoft Intune.""It's very informative when there is an error. It allows us to backtrace where the error is and resolve that ourselves. It's a bit of a Swiss Army penknife. We find that it fixes most issues.""The performance of Microsoft Intune is good.""Users can make screenshots, and devices only need the minimal version of iOS.""It helps implement conditional access policies to restrict mobile users from accessing potentially dangerous emails.""It provides control over all mobile devices that are being connected to the corporate network.""The product has eased the deployment of Microsoft apps to the devices. We can manage it properly. We can control it and push the updates. Another company helped us with the deployment. However, we can do it internally."

More Microsoft Intune Pros →

"The solution offers excellent documentation that is easily available online.""The product is a unified solution and you don't require to purchase tools from different vendors. The system analyzes behavior and activity and takes steps for protection.""Microsoft Mobility and EMS include Intune for Mobility, which provides mobile device management and mobile application management. With mobile device management, you can control the entire device in an organization.""A good feature that is present is MAM or Mobile Application Management. We can deploy this feature on the device, which is not managed by the organization. If I apply some security configuration on a personal device, the user would be really disappointed. What we do instead is that we give all access to the applications related to corporate and ask the users to use the application. We secure the application by putting the security features on the applications and not on the users' devices. This way, the users are happy, and we also meet our company's compliance standards. Then, everyone is happy.""It is a stable solution...It is a scalable solution.""Integration between our departments has been the most valuable.""The solution is scalable.""The solution is very good at securing files. For example, if I forward a secure document, it's blocked from others, as I can send it with restrictions in relation to who can open it."

More Microsoft Enterprise Mobility + Security Pros →

"Roles, connectors for provisioning and re-accreditation or reviews help greatly to govern user access.""The data collection is excellent and easy to do. It does not require a lot of configuration nor does it require rules to be written like other competitors do.""RSA Identity Governance and lifecycles are good for the access certification and auditing sections.""With the tool in place, you need to hire fewer people to provide access, and you have control over your processes.""The most valuable feature is the security, in particular, the One Time Password support."

More RSA Identity Governance and Lifecycle Pros →

Cons
"Additional application deployment options e.g. MSI deployment with more complex parameters or additional side-by-side files, and non-MSI deployment options.""In terms of what can be improved, I am looking for better enhancements regarding Apple management, not only on the mobile device, but also on the laptop.""It would be nice to have a location tracker for the mobile device management tool. I'm not sure if it exists but hasn't been configured or if it's missing, but we've been unable to utilize the location features.""Intune doesn't provide much control over Windows servers. It's something we struggle with.""Integrating certain group policies can be challenging and may necessitate using on-premises systems to integrate them with Microsoft Intune.""The security features should be improved.""The solution can have some compliance problems in general and the end-point user can bypass easily the company policies in Intune.""One big problem with Microsoft is that they're changing the names of the products quite often, or they're quite consistently doing so. Intune is now Endpoint administration. Constantly switching the user interface or the administrative interface makes it quite hard to keep pace. If you are on a two-week holiday and you come back and look at the same screen you have looked at for the last couple of months, it looks different, which is annoying. Changing things around all the time doesn't make it easy."

More Microsoft Intune Cons →

"The auditing and reporting could be updated and upgraded. I would like to see light applications because they consume a lot of the device's memory at present.""The MDM part of the engine could be better.""There are certain shortcomings in the licensing model of the product where improvements are required.""The licensing is quite expensive.""Microsoft's feature management is based on licenses. Microsoft follows ethical licensing and hence do not restrict the use of it.""Its performance needs enhancement.""Microsoft Enterprise Mobility + Security is expensive.""The licensing can be messy at times."

More Microsoft Enterprise Mobility + Security Cons →

"The user interface and workflow need improvement, and more connectors would help.""This product is missing a lot of features which other competitors are providing. One of the key features that are missing right now is risk scoring. Additionally, there is not much scope for customization - everything is hard-coded and predefined, so it does not allow the developers to make many modifications.""Technical support in Pakistan can be improved.""RSA Identity Governance and Lifecycle could improve out-of-the-box customization.""Every connector that you have in the product needs to be custom-built, so there are not a lot of standard connectors available in the product, because of which there are a lot of hidden consultancy costs.""There are scalability issues. This product does not scale very well. It is not a good product for load balancing / active–active architecture.""If you use the appliance version then it won't handle a huge database volume."

More RSA Identity Governance and Lifecycle Cons →

Pricing and Cost Advice
  • "Consider the Microsoft Enterprise Mobility Suite rather than choosing specific sub-components, e.g. only Microsoft Intune."
  • "There is a cost benefit of using Microsoft Intune because of the packaging with other Microsoft products."
  • "Microsoft Intune is a cost effective choice. It is less expensive than other products on the market."
  • "The purchase of the product was handled by someone else."
  • "I have no comment on pricing of the solution."
  • "The product is offered as part of a Microsoft standard bundle. The pricing can be competitive to Airwatch, and Maas360."
  • "For Microsoft 365 E5 clients, cost is not an issue as this product is one of the benefits."
  • "The price of Intune is included with the license for Office 365, so we don't have to pay anything extra for it."
  • More Microsoft Intune Pricing and Cost Advice →

  • "I would rate pricing at eight out of ten. It is a bit higher because of the security features that Microsoft provides."
  • "We have to pay 10 dollars per user. I would rate the tool's pricing a six out of ten."
  • "The solution is cost-effective."
  • "The increase in the prices of the product might not be the actual problem, but things become complex with some new plans that were introduced by Microsoft recently."
  • More Microsoft Enterprise Mobility + Security Pricing and Cost Advice →

  • "Pricing varies based on user count/number of modules you need."
  • "We are using the cloud platform, but we don't find it compatible to be served as a multi-tenant platform. This is a large drawback. It becomes expensive because it is then an all-dedicated solution. You have to have a separate tenant for each client, which increases the cost. The overall unit pricing can be less expensive than how it is right now."
  • "I rate the product's price a five on a scale of one to ten, where one is cheap, and ten is expensive."
  • More RSA Identity Governance and Lifecycle Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Enterprise Mobility Management (EMM) solutions are best for your needs.
    768,886 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes it… more »
    Top Answer:Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of… more »
    Top Answer: Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also… more »
    Top Answer:It is a stable solution...It is a scalable solution.
    Top Answer:The increase in the prices of the product might not be the actual problem, but things become complex with some new plans… more »
    Top Answer:Since Microsoft Enterprise Mobility + Security needs to deal with the competition from VMware and Ivanti, I visited… more »
    Top Answer:With the tool in place, you need to hire fewer people to provide access, and you have control over your processes.
    Top Answer:Every connector that you have in the product needs to be custom-built, so there are not a lot of standard connectors… more »
    Top Answer:RSA Identity Governance and Lifecycle can be deployed on the cloud or on-premise. We have our own proprietary cloud… more »
    Comparisons
    Also Known As
    Intune, MS Intune, Microsoft Endpoint Manager
    Enterprise Mobility + Security E3, Enterprise Mobility + Security E5, MS Enterprise Mobility + Security
    SecurID
    Learn More
    Overview

    Microsoft Intune is a comprehensive cloud-based service that allows you to remotely manage mobile devices and mobile applications without worrying about the security of your organization’s data. Device and app management can be used on company-owned devices as well as personal devices.

    In an increasingly mobile workforce, Microsoft Intune keeps your sensitive data safe while on the move. Microsoft Intune makes it possible for your team members to work anywhere using their mobile devices. Microsoft Intune provides both the flexibility and the control needed for securing all your data on the cloud, no matter where the device with the data is located.

    Microsoft Intune Device Management Key Features

    With Microsoft Intune Device Management you can:

    • Ensure devices and apps are compliant with your security requirements.
    • Rapidly deploy and authenticate apps on all company devices.
    • Remotely access devices to troubleshoot issues or to remove data from them.
    • Generate reports for all devices in the system.
    • Monitor the way users access and share information to protect company information.
    • Set rules and configure settings on personal and organization-owned devices to access data and networks.
    • Create user groups and device groups, allowing you to rapidly access many users and devices simultaneously.

    Mobile Application Management

    Mobile application management in Intune is designed to protect your organization’s data at the application level.

    With Microsoft Intune Application Management you can:

    • Configure apps to run with specific settings enabled.
    • Update existing apps that are already on the device.
    • See reports on which apps are used and monitor their usage.
    • Selectively wipe organization data from apps.
    • Add mobile apps to user groups and devices.

    As part of Microsoft's Enterprise Mobility + Security (EMS) suite, Intune integrates with Microsoft Entra ID for access control and with Azure Information Protection for data protection. It also integrates with Microsoft 365 Applications.

    Reviews from Real Users

    Microsoft Intune stands out among its competitors for a number of reasons. Two major ones are its ability to secure all devices under its management and the flexibility that the solution offers its users.

    A computing services manager notes, "Its security is most valuable. It gives us a way to secure devices, not only those that are steady. We do have a few tablets and other devices, and it is a way for us to secure these devices and manage them. We know they're out there and what's their status. We can manage their life cycle and verify that they're updated properly."

    The head of IT engineering at a financial services company writes, "The one feature we find most useful is the Mobile Application Manager. There are two types: we have the complete MDM and the Mobile Application Manager (MAM). We don't give our users phones, it is their own personal phone, and we need to allow them to have access to the company details on their phone. We need to create a balance between their own personal data and the company data. We deploy the Mobile Application Manager for them so that we won't be able to interfere with their own personal data."

    Microsoft Enterprise Mobility + Security (EMS) is the only comprehensive solution designed to help manage and protect users, devices, apps, and data in a mobile-first, cloud-first world.

    RSA SecurID provides world-leading two-factor authentication, protecting 25,000 organizations and 55 million users. RSA SecurID extends security to bring your own device (BYOD), cloud, and mobile as well as traditional virtual private network (VPN) and web portals. RSA SecurID solutions comprise three primary components: authenticator, platform, and agents.
    Sample Customers
    Mitchells and Buzzers, Callaway
    Mars, Whole Foods, Land O'Lakes, Dow
    NTT Com Asia, Virgin Blue, Bank of Uganda, EMEA Telecommunications Company, LAit (Lazio Innovazione Tecnologica), NyNet, OTP Bank, Red Bull Racing, Rupert House School, Signify, UK Local Authority, Bancolombia, Banco Popular de Puerto Rico (BPPR), TIVIT, Array Services, International Computerware, KPMG LLP, Moffitt Cancer Center
    Top Industries
    REVIEWERS
    Financial Services Firm19%
    Computer Software Company18%
    Comms Service Provider10%
    Energy/Utilities Company5%
    VISITORS READING REVIEWS
    Educational Organization23%
    Computer Software Company12%
    Government7%
    Financial Services Firm7%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm11%
    Government9%
    Manufacturing Company8%
    VISITORS READING REVIEWS
    Financial Services Firm27%
    Comms Service Provider10%
    Computer Software Company9%
    Manufacturing Company7%
    Company Size
    REVIEWERS
    Small Business38%
    Midsize Enterprise14%
    Large Enterprise48%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise33%
    Large Enterprise47%
    REVIEWERS
    Small Business44%
    Large Enterprise56%
    VISITORS READING REVIEWS
    Small Business21%
    Midsize Enterprise18%
    Large Enterprise61%
    REVIEWERS
    Small Business22%
    Midsize Enterprise22%
    Large Enterprise56%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise8%
    Large Enterprise68%
    Buyer's Guide
    Enterprise Mobility Management (EMM)
    April 2024
    Find out what your peers are saying about Microsoft, JAMF, VMware and others in Enterprise Mobility Management (EMM). Updated: April 2024.
    768,886 professionals have used our research since 2012.

    Microsoft Enterprise Mobility + Security is ranked 10th in Enterprise Mobility Management (EMM) with 10 reviews while RSA Identity Governance and Lifecycle is ranked 22nd in Identity Management (IM) with 9 reviews. Microsoft Enterprise Mobility + Security is rated 8.4, while RSA Identity Governance and Lifecycle is rated 6.8. The top reviewer of Microsoft Enterprise Mobility + Security writes "Seamless integration and easy implementation ". On the other hand, the top reviewer of RSA Identity Governance and Lifecycle writes "Lacking customization, poor support, but useful auditing". Microsoft Enterprise Mobility + Security is most compared with Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, ManageEngine Endpoint Central and Cisco Meraki Systems Manager (MDM+EMM), whereas RSA Identity Governance and Lifecycle is most compared with SailPoint IdentityIQ, Saviynt, One Identity Manager, CyberArk Privileged Access Manager and Cisco ISE (Identity Services Engine).

    We monitor all Enterprise Mobility Management (EMM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.