Microsoft Defender for Endpoint vs. Microsoft Enterprise Mobility + Security

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Microsoft Defender for Endpoint
Score 8.3 out of 10
N/A
Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection and response (EDR), automatic investigation and remediation, managed hunting services, rich APIs, and unified security management.
$2.50
per user/per month
Microsoft Enterprise Mobility + Security
Score 9.4 out of 10
N/A
Microsoft Enterprise Mobility + Security is a suite of applications supporting mobile device and application security, MDM, as well as conditional or privileged access with multi-factor authentication, and advanced security reporting. Products in the suite includes Microsoft Intune mobile device management, Azure Information Protection, Microsoft Identity Manager, Microsoft Cloud App Security, Azure Active Directory, and other ancillary applications.N/A
Pricing
Microsoft Defender for EndpointMicrosoft Enterprise Mobility + Security
Editions & Modules
Academic
$2.50
per user/per month
Standalone
$5.20
per user/per month
No answers on this topic
Offerings
Pricing Offerings
Microsoft Defender for EndpointMicrosoft Enterprise Mobility + Security
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Microsoft Defender for EndpointMicrosoft Enterprise Mobility + Security
Top Pros
Top Cons
Features
Microsoft Defender for EndpointMicrosoft Enterprise Mobility + Security
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Microsoft Defender for Endpoint
8.2
53 Ratings
3% below category average
Microsoft Enterprise Mobility + Security
-
Ratings
Anti-Exploit Technology8.051 Ratings00 Ratings
Endpoint Detection and Response (EDR)8.551 Ratings00 Ratings
Centralized Management7.952 Ratings00 Ratings
Hybrid Deployment Support7.810 Ratings00 Ratings
Infection Remediation8.252 Ratings00 Ratings
Vulnerability Management8.350 Ratings00 Ratings
Malware Detection8.553 Ratings00 Ratings
Best Alternatives
Microsoft Defender for EndpointMicrosoft Enterprise Mobility + Security
Small Businesses
SentinelOne Singularity
SentinelOne Singularity
Score 9.1 out of 10
NinjaOne
NinjaOne
Score 9.2 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.2 out of 10
KACE Systems Management Appliance
KACE Systems Management Appliance
Score 10.0 out of 10
Enterprises
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 8.7 out of 10
KACE Systems Management Appliance
KACE Systems Management Appliance
Score 10.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Microsoft Defender for EndpointMicrosoft Enterprise Mobility + Security
Likelihood to Recommend
8.2
(77 ratings)
9.5
(3 ratings)
Support Rating
9.0
(5 ratings)
-
(0 ratings)
User Testimonials
Microsoft Defender for EndpointMicrosoft Enterprise Mobility + Security
Likelihood to Recommend
Microsoft
It says it's cloud-based. There are lags, so it works well because we have a distributed workforce now working primarily from home, so it's easy to get in there and make those changes. If we were on site and we wanted faster validation of the changes, it would be missing that because it can't do it fast enough and get those quicker turnarounds.
Read full review
Microsoft
Microsoft Enterprise Mobility + Security has been ideal for our organization (and would be for any I can think of) for securing user accounts through MFA and admin accounts through PIM. Its end-point management is also great for set-up and configuration as well as management of your devices. It also provides you with useful metrics and feedback on your devices.
Read full review
Pros
Microsoft
  • When an end user opens a file or accesses a file I should say that has malicious content, it will quarantine the file. It will also let us know if an end user themselves has an issue now. So the whole Defender Suite has different parts. So some of these may be going over into Defender for identity and stuff. I'm not clear on which is which, but it's the whole ecosystem. I'll get an email letting me know that there's an issue and then we follow up. The email generally has a link in it to the actual event in the defender for endpoint or whatever console. And then we can start looking at the case, make sure the endpoint is quarantined. So it can't do anything. The only thing we can do is talk to it to do forensics or whatever so it's not totally isolated where we have to get somebody on the ground to go to the thing. We can still work on it remotely, but the end user can't do anything that would continue to cause lateral movement of the compromise or anything like that.
Read full review
Microsoft
  • Simple pre-packed solution for many popular Microsoft products
  • Advanced threat protection
  • Simplified end user management with Intune
Read full review
Cons
Microsoft
  • While it's a very good product for auditing, it has a very hard time to distinguish what is malicious and is an attack, what is not. Very rarely we get indication of a real malicious attack. We got lots of hours for off the shelf malware that it cleans up automatically. So basically we never get to look at it, which is a positive thing, but threats are detected by the third party endpoint, so it will not be enough by itself.
Read full review
Microsoft
  • InTune deployment via Hybrid Azure AD. The instructions seem very simple but there are lots of little areas you can get tripped up and there is little logging to see where you've gone wrong.
  • Advanced Threat Protection anti-impersonation. It is WAY too sensitive. Users emailing themselves from personal accounts get their mail sent to quarantine just because the name/label of the personal account matches their Office 365 mailbox name/label? HUH???
  • Licensing. Typical of Microsoft, what you're actually getting and details of licensing are confusing.
Read full review
Support Rating
Microsoft
The first time I tried to onboard my macOS endpoints to MDE I struggled for quite a bit. I had to reach out to Microsoft's MDE support team. The tech was very helpful in walking me through the steps during a screen share session
Read full review
Microsoft
No answers on this topic
Alternatives Considered
Microsoft
Tenable Security Center was a fantastic exposure detection tool but there was always a lag and servers would hang alot when being scanned causing resource traffic. Microsoft Defender for Endpoint on the other hand does not use up most resources soo there is usually noo lag during scanning and it also provide more detailed insights on the network. Also Microsoft Defender for Endpoint integration power has helped us up our security game by delivering a smooth secure network.
Read full review
Microsoft
Microsoft Enterprise Mobility + Security is better than any of the products I have used that do similar things. There is a huge convenience to all the things Microsoft Enterprise Mobility + Security brings together in one place. Also, the speed and streamlining nature of Intune helps with the management and set up of devices.
Read full review
Return on Investment
Microsoft
  • Positive : Microsoft Defender for Endpoint offers sophisticated threat detection and response capabilities, putting it into use helps increase security. Reduced security incidents, data breaches, and related expenses may arise from this.
  • Positive : A more secure environment means less time and effort spent by IT and security teams on remediation and incident response.
  • False Positives: Like any security solution, false positives can occur, leading to unnecessary investigations and potential disruptions to business operations. This may require additional resources to manage.
Read full review
Microsoft
  • Increased productivity, including service requests for our customers
  • Reduced operational costs, and threat/risk of cyber-attacks
Read full review
ScreenShots

Microsoft Defender for Endpoint Screenshots

Screenshot of blocked activitiesScreenshot of Detects & respondsScreenshot of discovers vulnerabilityScreenshot of Eliminates blind spotsScreenshot of Risk management