Evaluation Checklist
This checklist shows the many features that are available with Security Controls. Feel free to use this checklist to compare Security Controls with products from other vendors.
Item | Ivanti Security Controls | Competitor A | Competitor B |
---|---|---|---|
Installation and Licensing | |||
|
![]() |
||
|
![]() |
||
|
![]() |
||
Ease of Administration | |||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
Useability in Small, Medium and Large Organizations | |||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
Patch Scanning Criteria, Accuracy and Security | |||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
Control Over How Target Machines are Patched | |||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
Virtual Machine Support (Online and Offline VMs) | |||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
Application Control | |||
|
![]() |
||
|
![]() |
||
|
![]() |
||
Asset Management | |||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
Power Management | |||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
PowerShell Scripts | |||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
Reports | |||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
Application Program Interface (API) | |||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
Product Documentation and Support | |||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |
||
|
![]() |