We performed a comparison between Microsoft Enterprise Mobility + Security and SAP Identity Management based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, JAMF, VMware and others in Enterprise Mobility Management (EMM)."The solution is easy to use and it has good performance."
"The most valuable feature of Microsoft Intune is having all our devices compliant with our policies."
"The one feature we find most useful is the Mobile Application Manager. There are two types, we have the complete MDM and the Mobile Application Manager(MAM). We don't give our users phones, it is their own personal phone, and we need to allow them to have access to the company detail on their phone. We need to create a balance between their own personal data and the company data. We deploy the Mobile Application Manager for them so that we won't be able to interfere with their own personal data."
"The Autopilot feature is fantastic. It is a Microsoft product, so it deals best with Microsoft operating systems, but it can integrate with iOS, Mac OS, Linux, and Android."
"We can securely manage both company-owned devices and personal devices enrolled in our BYOD program."
"The features I found most valuable in Intune are its user visibility and troubleshooting options."
"This product offers an alternative solution to other UEM (Unified Endpoint Management) solutions."
"For our office workers who are not based in Norway, when we order the PC, we can do some of the settings for them. These are standardized settings. We can set them up exactly as they are in Norway so that they're the same."
"The product is a unified solution and you don't require to purchase tools from different vendors. The system analyzes behavior and activity and takes steps for protection."
"The product is centralized and we can use it for security purposes."
"It is a stable solution...It is a scalable solution."
"A good feature that is present is MAM or Mobile Application Management. We can deploy this feature on the device, which is not managed by the organization. If I apply some security configuration on a personal device, the user would be really disappointed. What we do instead is that we give all access to the applications related to corporate and ask the users to use the application. We secure the application by putting the security features on the applications and not on the users' devices. This way, the users are happy, and we also meet our company's compliance standards. Then, everyone is happy."
"The solution is scalable."
"You can scale the solution up or down by department."
"Integration between our departments has been the most valuable."
"The solution is very good at securing files. For example, if I forward a secure document, it's blocked from others, as I can send it with restrictions in relation to who can open it."
"It provides basic automatic user administration and role provisioning to save time."
"What I found most valuable in SAP Identity Management is process automation. The solution also gives transparency about what is happening and why which I find beneficial. Another feature I found valuable in SAP Identity Management is integration. It has very good integration."
"What's most valuable in SAP Identity Management is that it's easily an out-of-the-box solution for connectivity with SAP applications. We do not have to do any customizations, and this makes the solution very compatible with most SAP applications. SAP Identity Management is also very user-friendly."
"The most valuable feature is the user experience for managing information."
"The tool's most valuable features are its access control and approval of access requests. The self-service password reset feature is efficient. Role management capabilities streamline user access by assigning and revoking roles."
"The most valuable features of SAP Identity Management are business roles and automated user provisioning."
"What I like about SAP Identity Management is that it's stable for experienced users and suitable for access management, not just for SAP accounts, but for Active Directory, including file sharing and process sharing."
"The setup process is straightforward."
"Regarding mobile devices, Intune is good, but there are other services that I would say are ahead of Intune from an administration and reporting point of view."
"The reporting and cost have room for improvement."
"The solution requires Mac support."
"It would be great if Intune offered better data protection controls for BYOD Windows PCs."
"The solution can have some compliance problems in general and the end-point user can bypass easily the company policies in Intune."
"The main disadvantage seen today is regarding Linux clients. We have a lot of development resources that have Linux on their clients, and we can't manage them on the same platform, as we do with other clients such as macOS and Windows. So, it should have support for Linux clients. It should also have better support for macOS."
"The closest Microsoft Intune can be to GPOs, the better. There needs to be more granularity on application deployments. However, they have done better recently with the application deployments."
"The feature that allows us to import the business application from the configuration manager to Intune is not very good at this time."
"Microsoft's feature management is based on licenses. Microsoft follows ethical licensing and hence do not restrict the use of it."
"There are certain shortcomings in the licensing model of the product where improvements are required."
"The auditing and reporting could be updated and upgraded. I would like to see light applications because they consume a lot of the device's memory at present."
"The licensing can be messy at times."
"We did the deployment with the help of Microsoft's consultants. But sometimes, we found it difficult to educate the application developers to integrate."
"Its performance needs enhancement."
"The MDM part of the engine could be better."
"Microsoft Enterprise Mobility + Security is expensive."
"Research and marketing need to be improved."
"A lack of startup connectors to different systems, and could have better connectors for SAP IDM."
"I have encountered issues with the host authentication feature."
"I find SAP Identity Management complicated to use. Maintaining it is also complex."
"What needs improvement in SAP Identity Management is its compatibility with third-party applications. We'd like to get connectors or plugin settings to make it easier to manage other applications, whether SAP or non SAP applications. As SAP Identity Management is not compatible with non SAP applications, some of the clients are looking for other IDM applications such as SalePoint and Saviynt, so this is an issue we've observed in the solution."
"One of the areas for improvement in the solution is its user interface which needs to be up-to-date and fancier, in particular, have better visualization in terms of the tabs and buttons. The user interface of SAP Identity Management should be improved based on the latest trends."
"The pricing could be better."
"It needs to have the SSO for the HANA modules that SAP is releasing."
More Microsoft Enterprise Mobility + Security Pricing and Cost Advice →
Microsoft Enterprise Mobility + Security is ranked 10th in Enterprise Mobility Management (EMM) with 10 reviews while SAP Identity Management is ranked 12th in Identity Management (IM) with 13 reviews. Microsoft Enterprise Mobility + Security is rated 8.4, while SAP Identity Management is rated 7.8. The top reviewer of Microsoft Enterprise Mobility + Security writes "Seamless integration and easy implementation ". On the other hand, the top reviewer of SAP Identity Management writes "Allows for seamless integration and provides a unified login experience ". Microsoft Enterprise Mobility + Security is most compared with Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, ManageEngine Endpoint Central and Cisco Meraki Systems Manager (MDM+EMM), whereas SAP Identity Management is most compared with SailPoint IdentityIQ, Microsoft Identity Manager, SAP Customer Data Cloud, Saviynt and Omada Identity.
We monitor all Enterprise Mobility Management (EMM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.