Cybersixgill vs Microsoft Intune comparison

Cancel
You must select at least 2 products to compare!
Cybersixgill Logo
139 views|57 comparisons
100% willing to recommend
Microsoft Logo
25,959 views|17,987 comparisons
91% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Cybersixgill and Microsoft Intune based on real PeerSpot user reviews.

Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management.
To learn more, read our detailed Vulnerability Management Report (Updated: March 2024).
768,740 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"They also provide some of the greatest notification capabilities. I put in a customer's company name and domain names, or sometimes I put in their IP addresses as a keyword. Once Sixgill collects information that includes those keywords, they then provide us email notifications. That means we can catch information related to our customers as soon as possible.""To be diligent for the customer, we usually go into Cybersixgill Investigative Portal to analyze and search things. The solution tells us the reputation of cyber threat actors. So, if someone has a reputation of one, it is a really bad idea to care about what that person is saying. However, if you find someone with a reputation of nine, then there is a high probability that we need to address the problem. You can get information about these type of actors in Cybersixgill Investigative Portal. They have a huge collection, which is like having the rules/goals of the dark web and deep web without having to go there. Our analysts avoid going dark web because they have Cybersixgill Investigative Portal and can get the news from their browser, searching wherever they want.""The solution’s approach of using limited open source intelligence and focusing, instead, on the Deep Web and Dark Web is what seals the deal. That is why I like them. I have other tools that I can aggregate all the open source intelligence from. I value Cybersixgill because it provides access to things that no one else does.""The advanced analysis has made our security operations more efficient. It has also potentially given us quicker access to data that we might not have otherwise located."

More Cybersixgill Pros →

"Autopilot is the most valuable feature.""The aspects I find most valuable are the managing the data and applications. I can also restrict the users to install any applications. I can also wipe the data if the phone was missplaced or stolen. These are the basics for me.""The one feature we find most useful is the Mobile Application Manager. There are two types, we have the complete MDM and the Mobile Application Manager(MAM). We don't give our users phones, it is their own personal phone, and we need to allow them to have access to the company detail on their phone. We need to create a balance between their own personal data and the company data. We deploy the Mobile Application Manager for them so that we won't be able to interfere with their own personal data.""If the product works, remote access will be a benefit. To this point we have not had reason to have confidence in achieving that access.""While Microsoft Intune boasts a wide range of features, its user-friendliness and bundled licensing cost are key considerations for me.""The Microsoft Windows Autopilot and Defender policies are the most valuable features of this solution.""Intune can wipe devices. For example, if a disgruntled employee wants to leak the data on their company phone, Intune can terminate their access and wipe the entire device with a click.""The central administration con dashboard is very easy to use and provides very good oversight on all that needs to be monitored."

More Microsoft Intune Pros →

Cons
"Regarding their scraping abilities, things could be solidified. There are definitely improvements that could be made on the specificity for setting certain queries.""Sixgill has strong capabilities based on search queries, but there is some difficulty in using Sixgill. Their querying is very powerful but it can be difficult. It's not hugely complex but you need some skill to use Sixgill querying.""The breadth of access to data is good, but there are gaps. More data would be my suggestion because the platform is good and I have no complaints about the system. I think it is just a case of always trying to get more data sources.""We need real-time updated information. If we could have this, it would be amazing. For example, if someone was posting something, then ten second later, it was on the platform. Sometimes, it takes a minute or hours right now, depending on the forum."

More Cybersixgill Cons →

"The initial setup is a little bit complex.""There are some issues using the solution with macOS and iOS, and it offers limited granular control with them. Intune works better on Windows and Android.""The UI is not user-friendly and has room for improvement.""Enhancements for managing MacOS more comprehensively would be beneficial.""There should be more focus on mobile device security and integration.""An area for improvement is the absence of seamless integration, particularly with external dashboards.""The pricing can be expensive if you are not combining it with other products.""It would help if administrators could pinpoint the exact location of a stolen device to help law enforcement retrieve it and apprehend the suspect."

More Microsoft Intune Cons →

Pricing and Cost Advice
  • "The pricing is cheap compared with Recorded Future. Sixgill's cost-effectiveness is very good."
  • "Sometimes, Cybersixgill Investigative Portal is cheaper than its competitors."
  • "The pricing and licensing are good. It is expensive for us because the US dollar is quite strong compared to our dollar. Otherwise, it is quite reasonable for what it is. All the tools in the market are around the same price from my experience."
  • More Cybersixgill Pricing and Cost Advice →

  • "Consider the Microsoft Enterprise Mobility Suite rather than choosing specific sub-components, e.g. only Microsoft Intune."
  • "There is a cost benefit of using Microsoft Intune because of the packaging with other Microsoft products."
  • "Microsoft Intune is a cost effective choice. It is less expensive than other products on the market."
  • "The purchase of the product was handled by someone else."
  • "I have no comment on pricing of the solution."
  • "The product is offered as part of a Microsoft standard bundle. The pricing can be competitive to Airwatch, and Maas360."
  • "For Microsoft 365 E5 clients, cost is not an issue as this product is one of the benefits."
  • "The price of Intune is included with the license for Office 365, so we don't have to pay anything extra for it."
  • More Microsoft Intune Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
    768,740 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes it easy to control security and manage the usage of mobile apps when you have a… more »
    Top Answer:Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of the things I like about it Pros: Protected productivity: Intune gives you the… more »
    Top Answer: Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also access to both Microsoft’s user community as well as around-the-clock customer… more »
    Ranking
    50th
    Views
    139
    Comparisons
    57
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Views
    25,959
    Comparisons
    17,987
    Reviews
    67
    Average Words per Review
    727
    Rating
    8.3
    Comparisons
    Also Known As
    Intune, MS Intune, Microsoft Endpoint Manager
    Learn More
    Overview

    Sixgill’s fully automated threat intelligence solutions help organizations fight cyber crime, detect phishing, data leaks, fraud and vulnerabilities as well as amplify incident response in real-time. 

    Sixgill Investigative Portal empowers security teams with contextual and actionable alerts, along with the ability to conduct real-time, covert investigations:

      • Powered by the largest data lake of deep and dark web activity
      • Real-time actionable alerts customized to your organization
      • Quick deep dive into any escalation in real-time and gain a complete picture to understand the context.
      • Research threat actors profile, MO and history. Review and analyze across languages, sites, timeframes, types of products, topics, entities and more

      Microsoft Intune is a comprehensive cloud-based service that allows you to remotely manage mobile devices and mobile applications without worrying about the security of your organization’s data. Device and app management can be used on company-owned devices as well as personal devices.

      In an increasingly mobile workforce, Microsoft Intune keeps your sensitive data safe while on the move. Microsoft Intune makes it possible for your team members to work anywhere using their mobile devices. Microsoft Intune provides both the flexibility and the control needed for securing all your data on the cloud, no matter where the device with the data is located.

      Microsoft Intune Device Management Key Features

      With Microsoft Intune Device Management you can:

      • Ensure devices and apps are compliant with your security requirements.
      • Rapidly deploy and authenticate apps on all company devices.
      • Remotely access devices to troubleshoot issues or to remove data from them.
      • Generate reports for all devices in the system.
      • Monitor the way users access and share information to protect company information.
      • Set rules and configure settings on personal and organization-owned devices to access data and networks.
      • Create user groups and device groups, allowing you to rapidly access many users and devices simultaneously.

      Mobile Application Management

      Mobile application management in Intune is designed to protect your organization’s data at the application level.

      With Microsoft Intune Application Management you can:

      • Configure apps to run with specific settings enabled.
      • Update existing apps that are already on the device.
      • See reports on which apps are used and monitor their usage.
      • Selectively wipe organization data from apps.
      • Add mobile apps to user groups and devices.

      As part of Microsoft's Enterprise Mobility + Security (EMS) suite, Intune integrates with Microsoft Entra ID for access control and with Azure Information Protection for data protection. It also integrates with Microsoft 365 Applications.

      Reviews from Real Users

      Microsoft Intune stands out among its competitors for a number of reasons. Two major ones are its ability to secure all devices under its management and the flexibility that the solution offers its users.

      A computing services manager notes, "Its security is most valuable. It gives us a way to secure devices, not only those that are steady. We do have a few tablets and other devices, and it is a way for us to secure these devices and manage them. We know they're out there and what's their status. We can manage their life cycle and verify that they're updated properly."

      The head of IT engineering at a financial services company writes, "The one feature we find most useful is the Mobile Application Manager. There are two types: we have the complete MDM and the Mobile Application Manager (MAM). We don't give our users phones, it is their own personal phone, and we need to allow them to have access to the company details on their phone. We need to create a balance between their own personal data and the company data. We deploy the Mobile Application Manager for them so that we won't be able to interfere with their own personal data."

      Sample Customers
      Current customers include large enterprises, financial services, manufacturing, GSIs, MSSPs, government and law enforcement entities.
      Mitchells and Buzzers, Callaway
      Top Industries
      VISITORS READING REVIEWS
      Computer Software Company16%
      Financial Services Firm11%
      Manufacturing Company8%
      Government8%
      REVIEWERS
      Financial Services Firm19%
      Computer Software Company18%
      Comms Service Provider10%
      Energy/Utilities Company5%
      VISITORS READING REVIEWS
      Educational Organization23%
      Computer Software Company12%
      Government7%
      Financial Services Firm7%
      Company Size
      VISITORS READING REVIEWS
      Small Business36%
      Midsize Enterprise17%
      Large Enterprise47%
      REVIEWERS
      Small Business38%
      Midsize Enterprise14%
      Large Enterprise48%
      VISITORS READING REVIEWS
      Small Business20%
      Midsize Enterprise33%
      Large Enterprise47%
      Buyer's Guide
      Vulnerability Management
      March 2024
      Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management. Updated: March 2024.
      768,740 professionals have used our research since 2012.

      Cybersixgill is ranked 50th in Vulnerability Management while Microsoft Intune is ranked 1st in UEM (Unified Endpoint Management) with 164 reviews. Cybersixgill is rated 8.8, while Microsoft Intune is rated 8.0. The top reviewer of Cybersixgill writes "Provides early detection of imminent attacks, and speeds up addressing of vulnerabilities internally because it makes them real". On the other hand, the top reviewer of Microsoft Intune writes "We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy". Cybersixgill is most compared with Recorded Future, Intel 471, ZeroFOX, Digital Shadows and CyberInt Argos, whereas Microsoft Intune is most compared with Jamf Pro, VMware Workspace ONE, ManageEngine Endpoint Central, SOTI MobiControl and Microsoft Entra ID.

      We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.