We performed a comparison between Citrix Endpoint Management and Sophos Mobile based on real PeerSpot user reviews.
Find out in this report how the two UEM (Unified Endpoint Management) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Its protection policies are most valuable. It protects mobile devices as well as individual apps. It is pretty scalable, and its documentation is also pretty good. It is also pretty straightforward to deploy."
"The ability to send configurations to our systems is valuable, particularly as we don't have a regular Windows AD server. Our current environment doesn't have a Windows AD, which limits our ability to push GPOs. However, this is where the solution can step in and help us push policies."
"We use a local Active Directory, but we weren't able to manage all our on-site systems without a solution like Intune, and we needed to deploy software like VPNs and other things. It's seamless now to to this through Intune."
"Intune device restriction policies enable me to enforce limitations on the device, like blocking the mobile camera or restricting the employees from using and inserting USB devices, including thumb drives and flash drives."
"It's easy to deploy a configuration or policy to a system, especially when you don't have Azure AD. Now we are talking to all these small and medium-sized customers who don't necessarily have an on-premise Windows Active Directory. If they have invested in Office 365 Premium, this functionality becomes available to them."
"It's normally able to meet 100% expectations of our customers."
"The initial setup is not complex."
"The conditional access policies that we set up are very useful."
"The MAM applications of the product are great."
"A valuable feature of Citrix Endpoint Management is that it's stable. The stability is not a challenge among the move to the cloud."
"ShareFile, in particular, is valuable with its ease of sharing, and the best category security that is in the hands of users."
"The product is capable of acting in many different ways to help secure architecture."
"One key feature is secure application delivery, which enables the secure delivery of mobile and web applications to end-user devices. This ensures data protection and compliance with corporate policies."
"We have seen improvements in compliance management on the devices."
"The utmost importance lies in mobile security and its performance."
"The management and enrollment process is great, and with the asset management and instant action menu, we can easily maintain and support the users."
"I like the level of interaction that the product offers with the other products in our company's environment."
"The initial setup process is straightforward and fast."
"Sophos can block the Wi-Fi connection on a mobile device. That's one feature we wanted, but the main thing is the ability to disable the device if it's lost or stolen. We need to shut down PayPal, so it can't be used to make unauthorized purchases."
"One of the most valuable features of Sophos Mobile is the Wifi password."
"The security features work well."
"The solution provides us with data protection."
"It would be beneficial to have a more straightforward understanding of Intune's capabilities, presented in a simplified manner."
"It would be better if I could integrate it with my core group policy. I would like to have a group policy in my current environment, which has strict control, but those things are still missing. Although it has maximum compliance and security, it's not available on-premise."
"We would like to see support for Chrome and/or devices for Chromebooks."
"When somebody has a customized application or their own company's application, we cannot deploy that application."
"Intune's third-party patch management could be better. It should be easier for the average system admin to keep non-Microsoft applications updated."
"The documentation about the custom image setup could be better. Although Microsoft provides the steps to configure Intune or set up or deploy Intune, it doesn't have much information related to custom images. If you ask, "how can we deploy the custom image?" There is no information. The steps they mention ask you to connect to your on-premises environment or create your own image on the cloud itself once there is connectivity. But I needed to go to multiple websites to get all this information. I had to figure out how to upload the custom image if you want to use the on-premise custom image for Cloud PC. If you have the proper subscription, you must have the right access, like global admin or owner. Then you can add your custom image to that. There are no steps mentioned over there. Microsoft Intune doesn't have Chrome browser support. I would like to have that support because they will want it if we pitch the product to clients."
"In future releases, I would like to see better integration with Apple products."
"Its configuration is fairly complicated. You have to do quite a bit of discovery to be able to deploy it for a customer. You have to ask them a lot of questions. So, its initial deployment is the biggest challenge. They should make it easier to deploy with the use of Wizards or something else. During the deployment stage, there could be profiles for the customers who are particularly wanting to use certain feature sets of Intune."
"Requires integrating with ABM before enabling some of the features."
"Citrix often depends on other services like backend data centers, network security, and application firewalls. Issues in these areas can be misinterpreted as Citrix issues by users."
"Support for inventory management of Apple devices should be added."
"Citrix needs to improve the architecture. They also need to strengthen the application integration. They keep referring to some things to be required as security, and they keep selling the next level and on-premise separately. They should give the customer the opportunity to decide whether they want to use the next level on-premise or on-cloud, but they should not charge additional fees if the customer wants to deploy the next level on-premise because the customer is already being charged as the end user. They should allow next level on-premise optimization without any additional charges."
"The tool’s battery usage was high."
"To manage the Apple devices is not that straightforward there are a lot of features the other third parties solutions are offering which Sophos Mobile is not."
"Our support reps are based in the Philippines, and it's hard to connect with them sometimes. It took me about two months to resolve my issue, so it wasn't a good experience."
"We encounter issues while working with iOS."
"For Sophos Mobile, it is difficult to get good support."
"We would like to see graphics showing the use of each device."
"We have experienced issues in updating iOS devices when we set a minimum version requirement policy, and we do not have the option to force automatic installation. This means that the device must be supervised in order for updates to be applied, which we would like to see improved."
"There may be necessary adjustments that need to be made because we are facing certain restrictions within the work profile."
"The setup should be made easier."
Citrix Endpoint Management is ranked 7th in UEM (Unified Endpoint Management) with 10 reviews while Sophos Mobile is ranked 9th in Enterprise Mobility Management (EMM) with 13 reviews. Citrix Endpoint Management is rated 8.2, while Sophos Mobile is rated 7.6. The top reviewer of Citrix Endpoint Management writes "Offers flexible application management that allows secure delivery of applications to endpoints, enabling users to operate applications on the go". On the other hand, the top reviewer of Sophos Mobile writes "Stable product with central administration to manage device security ". Citrix Endpoint Management is most compared with VMware Workspace ONE, MOBI, ManageEngine Endpoint Central, Cisco Meraki Systems Manager (MDM+EMM) and CyberArk Identity, whereas Sophos Mobile is most compared with Jamf Pro, ManageEngine Endpoint Central, VMware Workspace ONE, Lookout and IBM MaaS360. See our Citrix Endpoint Management vs. Sophos Mobile report.
We monitor all UEM (Unified Endpoint Management) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.