We performed a comparison between Microsoft Intune and Tenable Security Center based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, VMware, ManageEngine and others in Unified Endpoint Management (UEM)."It has improve our organization through the remote management of non-domain joined devices."
"Intune's security features for Apple iOS and Mac OS are helpful. We can check enrollment, manage public and private settings, and manage the organization's data using security key features."
"One of the main features of the solution is it allows the management of many devices in different ways."
"Its protection policies are most valuable. It protects mobile devices as well as individual apps. It is pretty scalable, and its documentation is also pretty good. It is also pretty straightforward to deploy."
"The one feature we find most useful is the Mobile Application Manager. There are two types, we have the complete MDM and the Mobile Application Manager(MAM). We don't give our users phones, it is their own personal phone, and we need to allow them to have access to the company detail on their phone. We need to create a balance between their own personal data and the company data. We deploy the Mobile Application Manager for them so that we won't be able to interfere with their own personal data."
"This product offers an alternative solution to other UEM (Unified Endpoint Management) solutions."
"We are using the mobile feature, and we are also using MDM to lock the devices, to push restrictions, et cetera"
"It allows our clients to have the confidence to centrally manage policies for security. It helps them in securing the organization from a technology aspect."
"The most valuable feature of the product is the Assurance Report Card, which gives us an overview of the security poster in just a simple glance."
"What is useful to me is being able to fulfill very customized scanning policies. In the clinical environment, because of vendor control, we can't perform credential-vulnerability scanning. And network scans, which I've done before, can cause a lot of impact. Being able to create very customized policies to be able to routinely scan and audit our clinical networks, while simultaneously not causing impact, is important to us."
"The solution has a lean and easy-to-use interface that is not confusing to first-time users."
"I like Tenable.sc's analytics and reporting. You can also configure your on-prem network monitors to talk to your Tenable.sc control panel."
"Tenable.sc is user-friendly."
"The solution is one of the most, if not the most, stable product available."
"The Auto-Remediate feature is good."
"The most important features are the dashboard and reporting. The dashboard provides statistics with graphs and bar charts for our management."
"There is no catalog for mobile access management (MAM) security."
"In the next release, I would like a feature to be able to properly lock down the device. For example, if an attacker or somebody steals the phone, you can be sure that the pin cannot be broken."
"Intune's reporting and logging could be improved. When troubleshooting, it's difficult to collect the logs and determine what's happening. If I want to filter out the compliant devices, I can see it from the logs, but I would like the option to drill down further."
"The solution can have some compliance problems in general and the end-point user can bypass easily the company policies in Intune."
"The solution could improve its flexibility."
"The documentation about the custom image setup could be better. Although Microsoft provides the steps to configure Intune or set up or deploy Intune, it doesn't have much information related to custom images. If you ask, "how can we deploy the custom image?" There is no information. The steps they mention ask you to connect to your on-premises environment or create your own image on the cloud itself once there is connectivity. But I needed to go to multiple websites to get all this information. I had to figure out how to upload the custom image if you want to use the on-premise custom image for Cloud PC. If you have the proper subscription, you must have the right access, like global admin or owner. Then you can add your custom image to that. There are no steps mentioned over there. Microsoft Intune doesn't have Chrome browser support. I would like to have that support because they will want it if we pitch the product to clients."
"Additional application deployment options e.g. MSI deployment with more complex parameters or additional side-by-side files, and non-MSI deployment options."
"No option to do end-to-en macOS management. Slow implementation of policies."
"Its reporting can be improved. It is not easy to generate a scan report the way we want. The data is okay, but we can't easily change the template to make it look the way we want."
"We experienced some difficulties with the solution’s support."
"There is not much room for improvement. However, there should be a guide that describes the step-by-step procedures for doing tasks. Otherwise, training is required from a senior guy to a junior guy."
"Tenable.sc's user interface could be improved."
"Support could be faster."
"Security can always be improved."
"It's good at creating information, it's good creating dashboards, it's good at creating reports, but if you want to take that reporting metadata and put it into another tool, that is a little bit lacking."
"The integration is very good, although it still needs to improve."
Microsoft Intune is ranked 1st in Unified Endpoint Management (UEM) with 166 reviews while Tenable Security Center is ranked 1st in Risk-Based Vulnerability Management with 48 reviews. Microsoft Intune is rated 8.0, while Tenable Security Center is rated 8.2. The top reviewer of Microsoft Intune writes "We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy". On the other hand, the top reviewer of Tenable Security Center writes "A security solution for vulnerability assessment with automated scans". Microsoft Intune is most compared with Jamf Pro, VMware Workspace ONE, ManageEngine Endpoint Central, Microsoft Entra ID and SOTI MobiControl, whereas Tenable Security Center is most compared with Tenable Vulnerability Management, Qualys VMDR, Rapid7 InsightVM, Tenable Nessus and Horizon3.ai.
We monitor all Unified Endpoint Management (UEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.