

Microsoft Configuration Manager and Ivanti Security Controls compete in enterprise IT management. Microsoft Configuration Manager offers better integration with Microsoft products, while Ivanti Security Controls is preferred for its comprehensive security features.
Features: Microsoft Configuration Manager offers asset management, compliance tracking, and strong integration with Microsoft environments. It excels in application deployment, operating system deployment, and patch management. Ivanti Security Controls is recognized for advanced patch management, vulnerability assessment, and remediation capabilities.
Room for Improvement: Microsoft Configuration Manager could improve its user interface and offer more flexible non-Microsoft integrations. It may also benefit from enhanced reporting features and simplifying its configuration management. Ivanti Security Controls could improve in terms of simplifying its interface for new users, providing more seamless updates, and lowering its upfront costs for better affordability.
Ease of Deployment and Customer Service: Microsoft Configuration Manager provides seamless integration into Microsoft-centric environments with strong customer support for system management. Ivanti Security Controls offers an easy deployment process, robust support for patching, and is accessible across various environments.
Pricing and ROI: Microsoft Configuration Manager features a predictable cost model aligned with other Microsoft services, showing reasonable ROI for Microsoft-heavy infrastructures. Ivanti Security Controls requires a higher initial investment but offers strong ROI through its extensive security features, valuable for businesses prioritizing advanced security and compliance.
| Product | Market Share (%) |
|---|---|
| Microsoft Configuration Manager | 8.6% |
| Ivanti Security Controls | 2.5% |
| Other | 88.9% |


| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 13 |
| Large Enterprise | 64 |
Ivanti Security Controls simplifies security with unified and automated prevention, detection, and response techniques that target your biggest attack vectors. It provides the security global experts agree creates the highest barriers to modern cyber attacks, including discovery, OS and application patch management, privilege management, and whitelisting.
Microsoft Configuration Manager streamlines IT management with features such as software deployment, patch management, and automation, centralizing operations for Windows environments. Integration with Microsoft products allows efficient oversight of workstations and servers.
Microsoft Configuration Manager provides comprehensive IT management, offering software deployment, patch management, and application pushing. Automation reduces manual tasks, ensuring consistency across systems. Centralized management enables standardized OS deployments, application updates, and configuration integrity. Integration with Microsoft products facilitates seamless operations, while hardware and software inventory, compliance reporting, and remote control functions enhance IT management. Users seek improvements in application deployment for those without deep scripting knowledge and desire better WSUS control, PowerShell and Intune integration, Linux compatibility, and user interface enhancements. Performance improvements are requested for remote user management and third-party application support.
What features enhance Microsoft Configuration Manager?Microsoft Configuration Manager is widely implemented in organizations to manage Windows workstations and servers. It is essential for deploying operating systems and applications, managing software updates, and conducting hardware and software inventories. The tool is crucial for endpoint and configuration management, ensuring compliance, and automating processes like patching and vulnerability management. Industries such as finance, healthcare, and education rely on Microsoft Configuration Manager to keep systems secure and operational, adapting it to address their specific needs and challenges in maintaining diversified IT environments.
We monitor all Patch Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.