We performed a comparison between Ivanti Neurons for RBVM and Microsoft Intune based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management."Most of the features are similar to what other tools have, but the UIs are quite user friendly. A beginner could use it."
"Intune can wipe devices. For example, if a disgruntled employee wants to leak the data on their company phone, Intune can terminate their access and wipe the entire device with a click."
"The Autopilot feature is fantastic. It is a Microsoft product, so it deals best with Microsoft operating systems, but it can integrate with iOS, Mac OS, Linux, and Android."
"The biggest benefits of Intune are the ability to push changes and the added security. When we moved forward with Defender, we onboarded all those machines automatically. That helps dramatically. For a while, we were left with machines that weren't protected. We could see where people had done things they shouldn't have done, and Defender saved our skins a few times. It didn't happen a lot, but it happened enough that it made us glad we made that decision."
"Intune device restriction policies enable me to enforce limitations on the device, like blocking the mobile camera or restricting the employees from using and inserting USB devices, including thumb drives and flash drives."
"This product works very well for companies already using the full Microsoft suite."
"Remote Wipe and Autopilot is one of the best features."
"The reporting and analytics features in Microsoft Intune have been a lifesaver."
"The many policies available in Microsoft Intune for managing our devices are valuable."
"I would also like to see more integrations, plugins, and user-friendly automation, similar to the multiple integration scripts that Rapid7 has."
"In terms of what can be improved, I am looking for better enhancements regarding Apple management, not only on the mobile device, but also on the laptop."
"I would like to see micro VPN. I like the way that some of the other providers have done something similar where, as you open that app on an end-point device, it creates a micro VPN straight into your device, which is quite a nice little feature. Also, Microsoft Intune relies heavily on its fellow products in the suite. It would be nice if Microsoft Intune could stand on its own two feet."
"Areas for improvement in Intune include expanding support beyond Samsung devices to accommodate other Android manufacturers like Redmi and Motorola."
"Lacking ability to leverage more iOS device management internally."
"When somebody has a customized application or their own company's application, we cannot deploy that application."
"For an existing customer who has an SCCM, it would need to be upgraded to an MECM first before I can introduce Microsoft Intune."
"The synchronization could be improved."
"There are a few security features that are not available in Microsoft Intune, when compared to other products."
Ivanti Neurons for RBVM is ranked 26th in Vulnerability Management with 1 review while Microsoft Intune is ranked 1st in UEM (Unified Endpoint Management) with 163 reviews. Ivanti Neurons for RBVM is rated 9.0, while Microsoft Intune is rated 8.0. The top reviewer of Ivanti Neurons for RBVM writes "Useful for vulnerability management with many integrations". On the other hand, the top reviewer of Microsoft Intune writes "We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy". Ivanti Neurons for RBVM is most compared with Cisco Vulnerability Management (formerly Kenna.VM), Qualys VMDR, Tenable Security Center, Rapid7 InsightVM and Tenable Nessus, whereas Microsoft Intune is most compared with Jamf Pro, VMware Workspace ONE, ManageEngine Endpoint Central, SOTI MobiControl and Microsoft Entra ID.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.