Ivanti Neurons for RBVM vs Microsoft Intune comparison

Cancel
You must select at least 2 products to compare!
Ivanti Logo
363 views|274 comparisons
100% willing to recommend
Microsoft Logo
25,959 views|17,987 comparisons
91% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Ivanti Neurons for RBVM and Microsoft Intune based on real PeerSpot user reviews.

Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management.
To learn more, read our detailed Vulnerability Management Report (Updated: March 2024).
767,847 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Most of the features are similar to what other tools have, but the UIs are quite user friendly. A beginner could use it."

More Ivanti Neurons for RBVM Pros →

"Intune can wipe devices. For example, if a disgruntled employee wants to leak the data on their company phone, Intune can terminate their access and wipe the entire device with a click.""The Autopilot feature is fantastic. It is a Microsoft product, so it deals best with Microsoft operating systems, but it can integrate with iOS, Mac OS, Linux, and Android.""The biggest benefits of Intune are the ability to push changes and the added security. When we moved forward with Defender, we onboarded all those machines automatically. That helps dramatically. For a while, we were left with machines that weren't protected. We could see where people had done things they shouldn't have done, and Defender saved our skins a few times. It didn't happen a lot, but it happened enough that it made us glad we made that decision.""Intune device restriction policies enable me to enforce limitations on the device, like blocking the mobile camera or restricting the employees from using and inserting USB devices, including thumb drives and flash drives.""This product works very well for companies already using the full Microsoft suite.""Remote Wipe and Autopilot is one of the best features.""The reporting and analytics features in Microsoft Intune have been a lifesaver.""The many policies available in Microsoft Intune for managing our devices are valuable."

More Microsoft Intune Pros →

Cons
"I would also like to see more integrations, plugins, and user-friendly automation, similar to the multiple integration scripts that Rapid7 has."

More Ivanti Neurons for RBVM Cons →

"In terms of what can be improved, I am looking for better enhancements regarding Apple management, not only on the mobile device, but also on the laptop.""I would like to see micro VPN. I like the way that some of the other providers have done something similar where, as you open that app on an end-point device, it creates a micro VPN straight into your device, which is quite a nice little feature. Also, Microsoft Intune relies heavily on its fellow products in the suite. It would be nice if Microsoft Intune could stand on its own two feet.""Areas for improvement in Intune include expanding support beyond Samsung devices to accommodate other Android manufacturers like Redmi and Motorola.""Lacking ability to leverage more iOS device management internally.""When somebody has a customized application or their own company's application, we cannot deploy that application.""For an existing customer who has an SCCM, it would need to be upgraded to an MECM first before I can introduce Microsoft Intune.""The synchronization could be improved.""There are a few security features that are not available in Microsoft Intune, when compared to other products."

More Microsoft Intune Cons →

Pricing and Cost Advice
Information Not Available
  • "Consider the Microsoft Enterprise Mobility Suite rather than choosing specific sub-components, e.g. only Microsoft Intune."
  • "There is a cost benefit of using Microsoft Intune because of the packaging with other Microsoft products."
  • "Microsoft Intune is a cost effective choice. It is less expensive than other products on the market."
  • "The purchase of the product was handled by someone else."
  • "I have no comment on pricing of the solution."
  • "The product is offered as part of a Microsoft standard bundle. The pricing can be competitive to Airwatch, and Maas360."
  • "For Microsoft 365 E5 clients, cost is not an issue as this product is one of the benefits."
  • "The price of Intune is included with the license for Office 365, so we don't have to pay anything extra for it."
  • More Microsoft Intune Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
    767,847 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Most of the features are similar to what other tools have, but the UIs are quite user friendly. A beginner could use it.
    Top Answer:They could add more widgets, similar to Rapid7 and InsightVM. I would also like to see more integrations, plugins, and user-friendly automation, similar to the multiple integration scripts that Rapid7… more »
    Top Answer:We use RiskSense for vulnerability management, and we have many integrations. The solution is deployed on cloud. We use this solution daily. There are more than 200 people using this solution in my… more »
    Top Answer:Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes it easy to control security and manage the usage of mobile apps when you have a… more »
    Top Answer:Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of the things I like about it Pros: Protected productivity: Intune gives you the… more »
    Top Answer: Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also access to both Microsoft’s user community as well as around-the-clock customer… more »
    Ranking
    26th
    Views
    363
    Comparisons
    274
    Reviews
    1
    Average Words per Review
    202
    Rating
    9.0
    Views
    25,959
    Comparisons
    17,987
    Reviews
    67
    Average Words per Review
    727
    Rating
    8.3
    Comparisons
    Also Known As
    RiskSense
    Intune, MS Intune, Microsoft Endpoint Manager
    Learn More
    Overview
    Evolve your vulnerability management strategy to a risk-based approach. Ivanti Neurons for RBVM enables you to prioritize the vulnerabilities that pose the most risk to better protect against ransomware and other cyber threats.

    Microsoft Intune is a comprehensive cloud-based service that allows you to remotely manage mobile devices and mobile applications without worrying about the security of your organization’s data. Device and app management can be used on company-owned devices as well as personal devices.

    In an increasingly mobile workforce, Microsoft Intune keeps your sensitive data safe while on the move. Microsoft Intune makes it possible for your team members to work anywhere using their mobile devices. Microsoft Intune provides both the flexibility and the control needed for securing all your data on the cloud, no matter where the device with the data is located.

    Microsoft Intune Device Management Key Features

    With Microsoft Intune Device Management you can:

    • Ensure devices and apps are compliant with your security requirements.
    • Rapidly deploy and authenticate apps on all company devices.
    • Remotely access devices to troubleshoot issues or to remove data from them.
    • Generate reports for all devices in the system.
    • Monitor the way users access and share information to protect company information.
    • Set rules and configure settings on personal and organization-owned devices to access data and networks.
    • Create user groups and device groups, allowing you to rapidly access many users and devices simultaneously.

    Mobile Application Management

    Mobile application management in Intune is designed to protect your organization’s data at the application level.

    With Microsoft Intune Application Management you can:

    • Configure apps to run with specific settings enabled.
    • Update existing apps that are already on the device.
    • See reports on which apps are used and monitor their usage.
    • Selectively wipe organization data from apps.
    • Add mobile apps to user groups and devices.

    As part of Microsoft's Enterprise Mobility + Security (EMS) suite, Intune integrates with Microsoft Entra ID for access control and with Azure Information Protection for data protection. It also integrates with Microsoft 365 Applications.

    Reviews from Real Users

    Microsoft Intune stands out among its competitors for a number of reasons. Two major ones are its ability to secure all devices under its management and the flexibility that the solution offers its users.

    A computing services manager notes, "Its security is most valuable. It gives us a way to secure devices, not only those that are steady. We do have a few tablets and other devices, and it is a way for us to secure these devices and manage them. We know they're out there and what's their status. We can manage their life cycle and verify that they're updated properly."

    The head of IT engineering at a financial services company writes, "The one feature we find most useful is the Mobile Application Manager. There are two types: we have the complete MDM and the Mobile Application Manager (MAM). We don't give our users phones, it is their own personal phone, and we need to allow them to have access to the company details on their phone. We need to create a balance between their own personal data and the company data. We deploy the Mobile Application Manager for them so that we won't be able to interfere with their own personal data."

    Sample Customers
    Care First, City of Alburquerque, Electric Company El Paso, State of Arizona, Washington Gas
    Mitchells and Buzzers, Callaway
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company14%
    Healthcare Company10%
    Financial Services Firm9%
    Insurance Company7%
    REVIEWERS
    Financial Services Firm19%
    Computer Software Company18%
    Comms Service Provider10%
    Energy/Utilities Company5%
    VISITORS READING REVIEWS
    Educational Organization23%
    Computer Software Company12%
    Government7%
    Financial Services Firm7%
    Company Size
    VISITORS READING REVIEWS
    Small Business23%
    Midsize Enterprise14%
    Large Enterprise63%
    REVIEWERS
    Small Business38%
    Midsize Enterprise14%
    Large Enterprise48%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise33%
    Large Enterprise47%
    Buyer's Guide
    Vulnerability Management
    March 2024
    Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management. Updated: March 2024.
    767,847 professionals have used our research since 2012.

    Ivanti Neurons for RBVM is ranked 26th in Vulnerability Management with 1 review while Microsoft Intune is ranked 1st in UEM (Unified Endpoint Management) with 163 reviews. Ivanti Neurons for RBVM is rated 9.0, while Microsoft Intune is rated 8.0. The top reviewer of Ivanti Neurons for RBVM writes "Useful for vulnerability management with many integrations". On the other hand, the top reviewer of Microsoft Intune writes "We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy". Ivanti Neurons for RBVM is most compared with Cisco Vulnerability Management (formerly Kenna.VM), Qualys VMDR, Tenable Security Center, Rapid7 InsightVM and Tenable Nessus, whereas Microsoft Intune is most compared with Jamf Pro, VMware Workspace ONE, ManageEngine Endpoint Central, SOTI MobiControl and Microsoft Entra ID.

    We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.