We performed a comparison between Microsoft Intune and Recorded Future based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, VMware, ManageEngine and others in Unified Endpoint Management (UEM)."Being able to manage the devices remotely is most valuable. We can push security requirements through Microsoft Intune."
"It's very informative when there is an error. It allows us to backtrace where the error is and resolve that ourselves. It's a bit of a Swiss Army penknife. We find that it fixes most issues."
"Conditional access has helped us tailor and enforce our security policies in the mobile space."
"The solution is easy to use, simple to understand for those new to using it, and combined with the other Microsoft products it makes for an overall good package."
"Intune can wipe devices. For example, if a disgruntled employee wants to leak the data on their company phone, Intune can terminate their access and wipe the entire device with a click."
"One of the biggest advantages of Microsoft Intune is that it brings the management of Windows, macOS, iOS, Android, and even Linux under a single pane of glass."
"It works well if you have a Microsoft environment."
"It's normally able to meet 100% expectations of our customers."
"The tool is helpful in vulnerability assessment of zero-day vulnerabilities and phishing domains. The solution provides information on any domains of the organization that has undergone phishing or any other cyberattacks."
"The intel that they were providing us over the emails was very good. If it found any hashtag in our organization's name on the dark web, a rogue IP, or a marketplace, it would send us an email and notify us that this is being mentioned, and if we want, they can take some action."
"From the feedback I've received from my clients, the most valuable feature is the ability to personalize the solution. The ability to have a customized dashboard makes it easy for leadership and management to obtain details. Intelligence analysts or security engineers care about the actions and results, whereas the leadership care about graphs and reports. Recorded Future helps my clients create reports and also determine how the intelligence that is generated is consumed. They can easily show the benefits to the leadership without them having to invest 10 hours a week into transferring numbers into a graph or into creating reports."
"Has the ability to conduct and build any query without limitations."
"The solution is diverse and provides me with a lot of different mechanisms for evaluation."
"The most valuable feature of Recorded Future is how it detects everything regarding our domain."
"The most valuable feature is Recorded Future's protection of exposed customer data on the hardware side."
"It can collect data from various sources, including social media and the dark web."
"Lacks the ability to deploy more ways of management, managing devices and processing the policies."
"The policies we had in SCCM and AD offered features that are missing from Microsoft Intune."
"More integration with monitoring tools is needed."
"The solution could improve by having better integration with Apple."
"The reports aren't complete, and it's not easy to build custom reports. For example, Windows Autopilot isn't working well in cases where the computers don't have a good internet connection. Then the option is not good enough."
"When Microsoft Intune is used with different android devices it does not always work as it is supposed to."
"Lacking in features such as Wi-Fi and network security."
"I think there should be a better tracking of the cell phones used on the Intune."
"The solution could improve in reducing the false positives. However, most of the other tools on the market have false positives. If they enhance their data algorithm, it could improve the accuracy of results and minimize false positives. Identifying patterns of false possibilities can aid in developing better reporting features that could potentially eliminate them in the future. This recording feature tool could benefit from adopting similar techniques utilized by other tools to enhance its functionality. By doing so, it could minimize the need for manual efforts in distinguishing true positives from false positives, ultimately reducing the workload."
"Recorded Future is a very expensive solution, and its pricing could be improved."
"There is a semantic oncology dynamic relationship between how the MIGR Tech framework needs more data infusion enrichment capabilities."
"It sometimes detects false positives and reduces the overall accuracy of the system."
"The solution would benefit from introducing automation."
"At present, my clients need to be trained by me or another organization on how to use Recorded Future and how to get the best out of it as an analyst, engineer, and administrator. It would be better if clients could directly learn these things without having to go through me or other organizations."
"We can get the data of different malware active throughout the globe, but it would be good if we can do sandboxing of a file. For example, on Any Run, we can perform sandboxing of malware along with their intel about a particular file or hash. It would be great if they have a feature like that."
"When you add one website to Recorded Future, it should automatically call all other websites and social media platforms."
Microsoft Intune is ranked 1st in Unified Endpoint Management (UEM) with 165 reviews while Recorded Future is ranked 1st in Threat Intelligence Platforms with 10 reviews. Microsoft Intune is rated 8.0, while Recorded Future is rated 8.6. The top reviewer of Microsoft Intune writes "We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy". On the other hand, the top reviewer of Recorded Future writes "Traceless online searches, stable, and scalable". Microsoft Intune is most compared with Jamf Pro, VMware Workspace ONE, ManageEngine Endpoint Central, Microsoft Entra ID and SOTI MobiControl, whereas Recorded Future is most compared with ZeroFOX, CrowdStrike Falcon, Intel 471, Digital Shadows and Anomali ThreatStream.
We monitor all Unified Endpoint Management (UEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.