Introducing G2.ai, the future of software buying.Try now

Compare IBM MaaS360 and Trend Vision One - Endpoint Security

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
IBM MaaS360
IBM MaaS360
Star Rating
(200)4.2 out of 5
Market Segments
Mid-Market (43.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$5.00 per device $10.00 per user
Free Trial is available
Browse all 4 pricing plans
Trend Vision One - Endpoint Security
Trend Vision One - Endpoint Security
Star Rating
(110)4.3 out of 5
Market Segments
Mid-Market (55.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Trend Vision One - Endpoint Security

IBM MaaS360 vs Trend Vision One - Endpoint Security

When assessing the two solutions, reviewers found Trend Vision One - Endpoint Security easier to use, set up, and administer. Reviewers also preferred doing business with Trend Vision One - Endpoint Security overall.

  • Reviewers felt that Trend Vision One - Endpoint Security meets the needs of their business better than IBM MaaS360.
  • When comparing quality of ongoing product support, reviewers felt that Trend Vision One - Endpoint Security is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Trend Vision One - Endpoint Security over IBM MaaS360.
Pricing
Entry-Level Pricing
IBM MaaS360
Deluxe Edition
$5.00 per device
$10.00 per user
Browse all 4 pricing plans
Trend Vision One - Endpoint Security
No pricing available
Free Trial
IBM MaaS360
Free Trial is available
Trend Vision One - Endpoint Security
No trial information available
Ratings
Meets Requirements
8.3
157
8.9
92
Ease of Use
8.2
159
8.6
92
Ease of Setup
7.8
122
8.5
64
Ease of Admin
8.0
99
8.4
64
Quality of Support
8.1
153
8.3
88
Has the product been a good partner in doing business?
8.0
98
8.6
62
Product Direction (% positive)
8.4
161
8.5
86
Features by Category
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
8.2
43
Not enough data
Scope
8.3
33
Not enough data
8.2
34
Not enough data
Security
8.8
33
Not enough data
8.2
35
Not enough data
8.8
34
Not enough data
Management
8.5
37
Not enough data
8.5
35
Not enough data
8.3
36
Not enough data
8.3
33
Not enough data
7.9
33
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
7.9
14
Not enough data
7.7
13
Not enough data
7.7
14
Not enough data
7.9
14
Not enough data
7.9
14
Not enough data
7.9
15
Not enough data
7.8
15
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
8.7
30
Administration
Not enough data
9.1
26
Not enough data
8.4
27
Not enough data
8.3
25
Not enough data
8.1
20
Not enough data
9.0
23
Functionality
Not enough data
8.8
24
Not enough data
8.3
24
Not enough data
9.2
28
Not enough data
9.2
28
Analysis
Not enough data
8.4
27
Not enough data
8.9
26
Not enough data
9.1
27
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
9.0
10
Not enough data
Monitoring
9.0
10
Not enough data
9.2
10
Not enough data
8.5
10
Not enough data
8.8
10
Not enough data
9.0
10
Not enough data
Remediation
9.3
10
Not enough data
9.5
10
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
8.6
24
Not enough data
Generative AI
8.6
23
Not enough data
Mobile Application ManagementHide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Agentic AI - Mobile Application Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Autonomous Endpoint Management (AEM)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Generative AI - Autonomous Endpoint Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Management - Autonomous Endpoint Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Device Management (MDM)Hide 18 FeaturesShow 18 Features
8.6
82
Not enough data
Platform - Mobile Device Management (MDM)
8.7
65
Not enough data
Operating System
8.7
64
Not enough data
8.3
62
Not enough data
8.5
64
Not enough data
Management
8.5
69
Not enough data
8.7
61
Not enough data
8.5
61
Not enough data
8.8
56
Not enough data
8.0
63
Not enough data
Security
8.9
67
Not enough data
9.0
66
Not enough data
Agentic AI - Mobile Device Management (MDM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enterprise Mobility ManagementHide 21 FeaturesShow 21 Features
9.0
45
Not enough data
Platform
9.0
32
Not enough data
8.9
34
Not enough data
8.9
34
Not enough data
Operating System
8.7
31
Not enough data
8.9
29
Not enough data
9.3
31
Not enough data
Security
9.3
35
Not enough data
9.1
29
Not enough data
9.1
34
Not enough data
Management
9.0
35
Not enough data
9.1
33
Not enough data
9.2
34
Not enough data
9.2
32
Not enough data
8.4
33
Not enough data
Agentic AI - Enterprise Mobility Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
IBM MaaS360
IBM MaaS360
Trend Vision One - Endpoint Security
Trend Vision One - Endpoint Security
IBM MaaS360 and Trend Vision One - Endpoint Security are categorized as Endpoint Protection Platforms
Reviews
Reviewers' Company Size
IBM MaaS360
IBM MaaS360
Small-Business(50 or fewer emp.)
23.3%
Mid-Market(51-1000 emp.)
43.9%
Enterprise(> 1000 emp.)
32.8%
Trend Vision One - Endpoint Security
Trend Vision One - Endpoint Security
Small-Business(50 or fewer emp.)
10.6%
Mid-Market(51-1000 emp.)
55.8%
Enterprise(> 1000 emp.)
33.7%
Reviewers' Industry
IBM MaaS360
IBM MaaS360
Information Technology and Services
20.6%
Computer Software
6.7%
Banking
6.7%
Computer & Network Security
5.0%
Hospital & Health Care
4.4%
Other
56.7%
Trend Vision One - Endpoint Security
Trend Vision One - Endpoint Security
Information Technology and Services
12.5%
Hospital & Health Care
5.8%
Banking
5.8%
Financial Services
4.8%
Computer Software
4.8%
Other
66.3%
Alternatives
IBM MaaS360
IBM MaaS360 Alternatives
Jamf
Jamf
Add Jamf
Hexnode
Hexnode
Add Hexnode
ManageEngine Mobile Device Manager Plus
ManageEngine Mobile Device Manager Plus
Add ManageEngine Mobile Device Manager Plus
Scalefusion
Scalefusion
Add Scalefusion
Trend Vision One - Endpoint Security
Trend Vision One - Endpoint Security Alternatives
ThreatDown
ThreatDown
Add ThreatDown
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Add Symantec End-user Endpoint Security
Discussions
IBM MaaS360
IBM MaaS360 Discussions
What is IBM MaaS360 with Watson?
2 Comments
Sindhuja G.
SG
IBM MaaS360 with Watson is a cloud-based solution that combines Unified Endpoint Management (UEM) with AI-powered insights. It helps organizations manage and...Read more
Android Enterprise
1 Comment
JH
Hi Bryn, this could be a limitation you are experiencing related to your organizations licensing agreement with IBM. I would recommend contacting your...Read more
Is there a way to ensure no registered devices can connect to an unsecured wi-fi network?
1 Comment
JH
Yes. MaaS360 has a broad assortment of policy configurations available to customers, including the ability to mandate whether or not a device can connect...Read more
Trend Vision One - Endpoint Security
Trend Vision One - Endpoint Security Discussions
is it geeting more faster as it's slow here?
2 Comments
Did anyone get any complaints from users of slowness or high CPU utilization?
2 Comments
What is Apex One Trend Micro?
1 Comment
Ziad F.
ZF
Antivirus security systemRead more