Microsoft Intune and Tenable Nessus are leading tools in device management and vulnerability assessment, respectively. Users find Intune advantageous in pricing and support, while Nessus stands out for its feature-rich security capabilities.
Features: Microsoft Intune offers diverse capabilities, managing multiple devices across platforms, ease of integration, and scalability. Tenable Nessus provides comprehensive vulnerability assessment tools, precision scanning, and rapid threat detection.
Room for Improvement: Microsoft Intune could enhance reporting functions, improve configuration steps, and offer better customization options. Tenable Nessus would benefit from a streamlined update process, simpler user guidance, and more intuitive navigation.
Ease of Deployment and Customer Service: Microsoft Intune is known for straightforward setup and responsive support. Tenable Nessus deployment is complex but offers thorough customer service with detailed technical assistance.
Pricing and ROI: Microsoft Intune is cost-effective with strong ROI due to seamless integration and competitive pricing features. Tenable Nessus, although more expensive, provides value with comprehensive security insights that justify the investment.
Everything we've gained from it makes my job easier day after day, and I see value in it as an engineer.
Importantly, when someone leaves the company, it helps protect document access on their devices.
Applications are deployed through Intune, and we see fewer tickets for common issues because we can resolve them through the solution.
When a support ticket is submitted, it directly reaches someone with Intune support expertise.
When I contacted Microsoft, they had the same expertise, if not more, which is phenomenal because I felt heard and my problem was solved.
Sometimes, the support provided is excellent, and the representative is knowledgeable, while other times, the service needs improvement.
Whenever any issue arises, we contact the support, and they are always there for us.
The technical support is good yet could improve in terms of response time.
The scalability of Microsoft Intune is ten out of ten.
Ideally, we want to automatically segregate devices based on user properties like primary use, but currently, dynamic groups seem limited to device properties.
It supports organizations with 200 endpoints and those with more than 15,000 endpoints.
Whether managing 50 servers today or 500 tomorrow, performance or capacity are not hindered.
Microsoft Intune has been very stable.
A couple of years ago, the performance was not as good as it is now, but there are noticeable backend improvements.
We've encountered problems with other services like Exchange, Intune has remained unaffected.
We have not encountered any issues with missing network items or errors in API and webhook interactions.
There are communication issues, so you might start working with a feature without knowing if it will be deprecated six months from now.
Many third-party companies offer single-pane-of-glass reporting that shows you what your update environment looks like, how your patch is doing, application status, etc., but Intune's reporting is not intuitive.
Workspace ONE operates in real-time, whereas Intune has a noticeable delay when deploying policies or apps.
The documentation is not well-organized, which can be confusing when searching for solutions or specific information related to Tenable Nessus Professional.
Introductory professional services, like a fast-track service, were included with our E5 membership, and there have been no additional costs.
The Intune suite and add-ons, such as batch management and remote help, are costly.
Microsoft Intune's costliness stems from licensing fees and the overhead associated with its management, user experience, and device remediation.
Tenable Nessus's pricing is adequate if it is fully utilized.
Intune excels in configuration and compliance management for Windows 10, ensuring devices receive timely updates and adhere to organizational standards.
Dynamic groups allow us to set conditions for automatic membership, eliminating the need for user intervention or manual review and ensuring a seamless workflow.
Windows Autopatch is the most valuable because it removes the burden of patch management.
The scanning and reporting features are the most valuable aspects of Tenable Nessus.
The features I personally like include host discovery.
Microsoft Intune is a comprehensive cloud-based service that allows you to remotely manage mobile devices and mobile applications without worrying about the security of your organization’s data. Device and app management can be used on company-owned devices as well as personal devices.
In an increasingly mobile workforce, Microsoft Intune keeps your sensitive data safe while on the move. Microsoft Intune makes it possible for your team members to work anywhere using their mobile devices. Microsoft Intune provides both the flexibility and the control needed for securing all your data on the cloud, no matter where the device with the data is located.
Microsoft Intune Device Management Key Features
With Microsoft Intune Device Management you can:
Mobile Application Management
Mobile application management in Intune is designed to protect your organization’s data at the application level.
With Microsoft Intune Application Management you can:
As part of Microsoft's Enterprise Mobility + Security (EMS) suite, Intune integrates with Microsoft Entra ID for access control and with Azure Information Protection for data protection. It also integrates with Microsoft 365 Applications.
Reviews from Real Users
Microsoft Intune stands out among its competitors for a number of reasons. Two major ones are its ability to secure all devices under its management and the flexibility that the solution offers its users.
A computing services manager notes, "Its security is most valuable. It gives us a way to secure devices, not only those that are steady. We do have a few tablets and other devices, and it is a way for us to secure these devices and manage them. We know they're out there and what's their status. We can manage their life cycle and verify that they're updated properly."
The head of IT engineering at a financial services company writes, "The one feature we find most useful is the Mobile Application Manager. There are two types: we have the complete MDM and the Mobile Application Manager (MAM). We don't give our users phones, it is their own personal phone, and we need to allow them to have access to the company details on their phone. We need to create a balance between their own personal data and the company data. We deploy the Mobile Application Manager for them so that we won't be able to interfere with their own personal data."
Tenable Nessus is a vulnerability management solution that aims to empower organizations to be aware of threats that both they and their customers face. It is the most deployed scanner in the vulnerability management industry. Organizations that use this product have access to the largest continuously updated global library of vulnerability and configuration checks. They can stay ahead of threats that Tenable Nessus’s competitors may be unable to spot. Additionally, Tenable Nessus supports a greater number of technologies than its competitors.
Tenable Nessus Benefits
Some of the ways that organizations can benefit by deploying Tenable Nessus include:
Tenable Nessus Features
Reviews from Real Users
Tenable Nessus is a solution that stands out when compared to many of its competitors. Two major advantages it offers are its ease of use and its vulnerability scanning feature.
Rallis F., the principal security architect at a technology vendor, writes, “The ease of use is the primary valuable feature. This specific version is very straightforward. I like the ability to modify it and configure it based on the different policies.”
Sandip D., a cyber security expert at Birlasoft India Ltd, writes, “The vulnerability scanner is the most valuable feature. It's an important feature for us. We use the plugin output for that. It shows us the exact version of Nessus and what is needed for remediation. Based on that, we decide what should be remediated first to get the best result for security.”
We monitor all Unified Endpoint Management (UEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.