We performed a comparison between Quest KACE Systems Management and SolarWinds Network Configuration Manager based on real PeerSpot user reviews.
Find out in this report how the two Configuration Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The Autopilot feature is fantastic. It is a Microsoft product, so it deals best with Microsoft operating systems, but it can integrate with iOS, Mac OS, Linux, and Android."
"It's not working perfectly, but Microsoft's Autopilot offers great visibility into automated deployment solutions."
"Maturity makes it a stable product."
"It has a useful device management feature."
"It provides control over all mobile devices that are being connected to the corporate network."
"It supports end-users who tend to lock their devices quite frequently. Its conditional access policy helps us keep the users logged into their devices."
"It is quite policy-enabled, so you can build pretty much any policy to manage remote endpoints."
"The ability to manage devices with different sets of policies is most valuable."
"The single pane of glass for managing devices is helpful because it allows me to perform updates and control things without having to disturb the doctors or nurses."
"The Systems Deployment Appliance is magical when it comes to automating deployment... Not only can we have multiple images, specific to end-users' uses, but we have a plethora of post-installation tasks to install or configure the system, tasks that can be re-used for each system. You just have one basic base image, and then you use the post-install tasks to customize everything else. It is amazing."
"This solution makes it easy to control assets and upgrade all types of software."
"The software asset management has been a big help, even when it comes to license true-ups. I can use it to find out how many Tivoli we have, and boom, there's the number... And you can actually click on the information about the software and it shows, for example, that these five servers are where it's being reported. If you really want, you can log in to them and validate."
"The solution provides us a single pane of glass with everything that we need for endpoint management of all devices. It definitely has made our endpoint management process much easier."
"There is one place for a lot of different things. If somebody has a problem with their computer, they will put in a ticket. From there, we will know who it is and the assets assigned to them, because there is one place to go look for what we are talking about and with whom we are talking. Just having one place for everything is really convenient. For example, we are able to deploy software to hundreds of computers. We don't need to go to each individual device."
"This product made the job easy to do without having to go put hands on the machines."
"The most valuable feature is the imaging of computers through the SDA... Being able to do that so quickly with the SDA, and to then use the SMA for reinstalling software, has been huge for our productivity."
"The scanning features have proven to be highly valuable, particularly due to the comprehensive information they provide."
"It is a stable solution."
"The most valuable features the solution offers are compliance, reliability, and information about reliability."
"The features we find most valuable is the configuration backup automation, the configuration compliance, the security vulnerability detection and upgrading devices."
"Its main functionality is highly beneficial as it centralizes the management of configuration items across the network."
"It allows us to manage backups in big companies. It is also useful in managing the configuration changes."
"Configuration refers to the specific settings and options that determine how a device or system behaves. It can include things, such as network settings, security settings, and other options that are specific to the device or system in question. One of the most valuable features of the solution was its ability to track and monitor changes to the configuration of devices on a network. This can be useful for troubleshooting and identifying potential issues. By keeping track of who made changes to the configuration and when it can be easier to determine the cause of any problems that may arise."
"The most valuable Real-time fault detection is beneficial as it enables the identification of changes made to a device's configuration through the SolarWinds Network Configuration Manager. This makes it easy to pinpoint which configurations were added or removed, potentially causing network issues. Such changes are saved in logs for future reference."
"It doesn't economize when you scale up. We have over 14,000 employees, and we have between 7,500 and 8,000 city-owned or personal devices being used to conduct city business. Its price can be improved. It is not a cheap solution."
"I would like the ability to install the agent on devices from suppliers, which would enable us to implement a zero-trust strategy for guest devices."
"It would help if administrators could pinpoint the exact location of a stolen device to help law enforcement retrieve it and apprehend the suspect."
"Microsoft Intune is not user-friendly to manage and has room for improvement."
"Lacking ability to leverage more iOS device management internally."
"One area for improvement is app deployment. Another is the Windows update rollout. If you're rolling out an object to a device that's offline, Intune stops trying to reach this device after it sits idle for a bit. We are forced to find a workaround that could help manage that."
"There can be more logs. I do not have any other requirements."
"There are a few security features that are not available in Microsoft Intune, when compared to other products."
"We had issues with the tool's support. We are a Dutch firm and everything has to be in Dutch. We were not able to do the alerts. You were required to tweak them a lot to get them in the language that you preferred. The solution's support depended on the person that you got online. Sometimes, the response was fast and other times you needed to wait a long time. The support also depended on the levels of support that you had requested."
"The problem is that it's harder to directly emulate a lot of the stuff that the group policies do, using the KACE solution. With regular group policies, you just specify the various settings you want to change on the workstations, and then you specify the workstations and—while it's kind of an ugly mess—it does it. Whereas on KACE, you really have to know what you're doing with scripting to effectively script those exact same changes."
"The software asset management functionality is an area that needs to be improved. It could be more automated because when connections need to be made, such as when I connected Adobe and my malware removed, the process was pretty much manual."
"It took a little bit of time to figure out how to use the KACE Service Desk. I like the way that I'm able to customize it. But when it comes to how our techs are able to use it, it's not as functional as our current solution, which is BMC FootPrints Service Desk."
"I think it should have the ability to have the applications automatically update. It would be really helpful if this would override what the user might choose to do."
"Sometimes the information is not as real time as it's supposed to be."
"Scalability is my primary concern right now."
"The only hiccups we had were some power issues, where the box was a little under-powered early on."
"I'd like to see additional features like support for devices that don't use CLI for configuration backups, expanded inventory support for other vendors beyond Cisco, and compatibility with newer SD WAN devices. These enhancements would further improve the product's versatility and utility for users. we hope for future enhancements, especially in supporting security devices that lack CLI backup options."
"The network logs could be improved. When the error logs come across with those false positive alarms in the error logs."
"The third-party plugins available in the solution could improve. I have received some issues with the templates."
"Improvements are needed in the automatic network mapping function."
"For each device, when you open the network performance monitor, it will give you all of the information about the device, but many of the natural configuration management features are not on that page."
"Its look and feel can be improved. They can also put in more effort into building the THWACK community and use the information about various customer issues and requests to build the new releases."
"Our experience has shown that most of the problems we've had with SolarWinds NCM are related to software issues."
"We want to be able to store it in a data warehouse format and integrate it with Google single sign-on."
More Quest KACE Systems Management Pricing and Cost Advice →
More SolarWinds Network Configuration Manager Pricing and Cost Advice →
Quest KACE Systems Management is ranked 9th in Configuration Management with 38 reviews while SolarWinds Network Configuration Manager is ranked 10th in Configuration Management with 22 reviews. Quest KACE Systems Management is rated 8.8, while SolarWinds Network Configuration Manager is rated 8.2. The top reviewer of Quest KACE Systems Management writes "Easy to use, saves us time, and increases IT productivity". On the other hand, the top reviewer of SolarWinds Network Configuration Manager writes "Streamlines network configuration and compliance processes through its centralized dashboard, although its compatibility with multi-vendor devices may present limitations". Quest KACE Systems Management is most compared with Microsoft Configuration Manager, Microsoft Windows Server Update Services, BigFix, Red Hat Ansible Automation Platform and Automox, whereas SolarWinds Network Configuration Manager is most compared with Cisco DNA Center, Cisco Prime, Red Hat Ansible Automation Platform, OpenText Network Node Manager i and DataMiner. See our Quest KACE Systems Management vs. SolarWinds Network Configuration Manager report.
See our list of best Configuration Management vendors.
We monitor all Configuration Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.