Anonymous UserIT Consultant Supervisor at a financial services firm
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"If the product works, remote access will be a benefit. To this point we have not had reason to have confidence in achieving that access."
"The most important thing for me is the autopilot feature."
"The dashboards, the security, and the customization capabilities work very well for us."
"We have not experienced any bugs or glitches with this solution."
"This product offers an alternative solution to other UEM (Unified Endpoint Management) solutions."
"Maturity makes it a stable product."
"The most valuable feature is the UEM capabilities."
"The most valuable feature for us is the security, including risk analysis and patch management."
"Technical support is fantastic."
"The most valuable features are vulnerability detection and the scanning capability to enable identification of vulnerabilities across our network."
"What I like about Qualys VM is the dashboard presentation. It's very good."
"It's a good product. After the scan our internet works well. It scans our security posture."
"It is very easy to use and there are lots of options. We can usually easily go through it and all of the things we want to configure, and we can configure everything to our specifications very easily."
"The initial setup was good. We didn't have any problems with it."
"Technical support is great and we've never really had a problem."
"The features that are most valuable are the identification, scan features, and the identification of vulnerabilities."
"The difficulty of the the roll out is surprisingly difficult considering this product is supposed to be an integrated part of the 365 suite."
"I would like to see the ability to deploy custom packages as a Windows 64-bit package, as opposed to the Windows 32-bit, which is the only one available now."
"It would be helpful if there was proactive remediation."
"There are items that require improvements. One is the controls from iOS."
"The reporting needs to be a bit more interactive."
"There is no catalog for mobile access management (MAM) security."
"The configuration could be better by consolidating options and making it simpler."
"There's quite a lot of development that they can do within their Intune dashboard. I think there are too many lines hyperlinked to move you around. Others, in contrast, give you a simple dashboard and an intuitive administrative walkthrough."
"It's quite complex on the way it is set up, so it takes a fair bit of time in order to get your head around it in order to deploy it. Once you've deployed it, then you're never confident on the versions of the browsers and the SSL certificates, etc. You have to always go back into Qualys and check."
"I would like to see this solution more developed and competitive in the Cloud space."
"The customer support is very bad."
"The reporting needs improvement. It should generate much more stuff like field reports."
"Sometimes we face a problem with accessing the tool and not getting an expected result. From a technology point of view, they need to look into this."
"The ability to manage user accounts and give rights to the operator to know about abnormalities of applications is something that needs improvement."
"We are moving away from Qualys to Defender ATP because I find that Defender ATP is much better at prioritizing the vulnerabilities that I should be looking at."
"I would like to see more accuracy in detections, better reporting capabilities, and better dashboard download capabilities."
"For Microsoft 365 E5 clients, cost is not an issue as this product is one of the benefits."
"The price of Intune is included with the license for Office 365, so we don't have to pay anything extra for it."
"The pricing for Microsoft Intune is reasonable. Our clients are satisfied."
"The price of Intune is often included as part of a bundle with other Microsoft licenses, which makes it somewhat cheaper."
"Licensing depends on how you are providing support to your enterprise, whether it's device-based or user-based."
"We work with the subscription rather than a server license. I think it's economical this way because we don't have to have a server license for that, and I think that works in our favor."
"Pricing can be improved."
"The price could be better."
"They have recently changed the pricing model, which is now better than it was before."
"It is different for every company, but for us, it's every three years."
"Qualys is cheaper and more affordable than other solutions."
"The pricing and licensing for Qualys could be improved."
Intune is a cloud-based service in the enterprise mobility management (EMM) space that helps enable your workforce to be productive while keeping your corporate data protected. With Intune, you can:
Qualys Vulnerability Management (VM) is a cloud-based service that gives you immediate, global visibility into where your IT systems might be vulnerable to the latest Internet threats and how to protect them. It helps you to continuously identify threats and monitor unexpected changes in your network before they turn into breaches.
Microsoft Intune is ranked 1st in Enterprise Mobility Management (EMM) with 30 reviews while Qualys VM is ranked 4th in Vulnerability Management with 13 reviews. Microsoft Intune is rated 7.8, while Qualys VM is rated 8.4. The top reviewer of Microsoft Intune writes "Unified endpoint management that has the flexibility of stand-alone components". On the other hand, the top reviewer of Qualys VM writes "Easy to use and scalable but needs to be priced more competitively". Microsoft Intune is most compared with VMware Workspace ONE, Jamf Pro, IBM MaaS360, ManageEngine Desktop Central and SOTI MobiControl, whereas Qualys VM is most compared with Tenable Nessus, Tenable SC, Rapid7 InsightVM, Darktrace and Kenna.VM.
See our list of .
We monitor all Enterprise Mobility Management (EMM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.