Introducing G2.ai, the future of software buying.Try now

Compare IBM MaaS360 and WithSecure Elements Endpoint Protection

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
IBM MaaS360
IBM MaaS360
Star Rating
(198)4.2 out of 5
Market Segments
Mid-Market (44.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$5.00 per device $10.00 per user
Free Trial is available
Browse all 4 pricing plans
WithSecure Elements Endpoint Protection
WithSecure Elements Endpoint Protection
Star Rating
(108)4.4 out of 5
Market Segments
Mid-Market (43.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about WithSecure Elements Endpoint Protection
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that IBM MaaS360 excels in Asset Management with a score of 9.6, indicating a robust capability to track and manage devices effectively, while WithSecure Elements Endpoint Protection, although strong, scores slightly lower at 8.8. Reviewers mention that this feature is crucial for organizations needing detailed oversight of their assets.
  • Reviewers mention that WithSecure Elements Endpoint Protection shines in Malware Detection, achieving a score of 9.3 compared to IBM MaaS360's 8.6. Users on G2 highlight the effectiveness of WithSecure's detection capabilities in identifying and neutralizing threats quickly.
  • Users say that IBM MaaS360's Remote Wiping feature is highly rated at 9.5, providing peace of mind for organizations concerned about data security on lost or stolen devices. In contrast, WithSecure's score of 8.9, while still good, indicates it may not be as comprehensive in this area.
  • G2 users report that WithSecure Elements Endpoint Protection offers superior Firewall capabilities, scoring 9.0, which reviewers mention as a critical feature for maintaining network security. IBM MaaS360's score of 8.8 suggests it may not provide the same level of protection.
  • Reviewers mention that IBM MaaS360 has a strong focus on Compliance, scoring 9.2, which is essential for businesses needing to adhere to regulatory standards. WithSecure's score of 9.0 is commendable but indicates a slightly less comprehensive approach to compliance management.
  • Users report that WithSecure Elements Endpoint Protection's Behavioral Analysis feature, scoring 9.3, is particularly effective in identifying unusual patterns that may indicate security threats, while IBM MaaS360's score of 8.8 suggests it may not be as advanced in this area.
Pricing
Entry-Level Pricing
IBM MaaS360
Deluxe Edition
$5.00 per device
$10.00 per user
Browse all 4 pricing plans
WithSecure Elements Endpoint Protection
No pricing available
Free Trial
IBM MaaS360
Free Trial is available
WithSecure Elements Endpoint Protection
Free Trial is available
Ratings
Meets Requirements
8.3
155
8.7
84
Ease of Use
8.1
157
9.1
85
Ease of Setup
7.8
120
8.5
26
Ease of Admin
8.0
98
8.4
25
Quality of Support
8.1
151
8.7
77
Has the product been a good partner in doing business?
7.9
97
8.3
23
Product Direction (% positive)
8.4
159
8.4
81
Features by Category
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
8.1
41
Not enough data
Scope
8.3
32
Not enough data
8.2
33
Not enough data
Security
8.8
32
Not enough data
8.2
34
Not enough data
8.8
33
Not enough data
Management
8.4
35
Not enough data
8.4
34
Not enough data
8.2
34
Not enough data
8.3
32
Not enough data
7.8
32
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
7.9
13
Not enough data
7.6
12
Not enough data
7.7
13
Not enough data
7.7
13
Not enough data
7.7
13
Not enough data
7.7
14
Not enough data
7.6
14
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
8.9
14
Administration
Not enough data
9.0
10
Not enough data
8.9
11
Not enough data
8.3
11
Not enough data
9.5
10
Not enough data
8.8
11
Functionality
Not enough data
9.1
9
Not enough data
8.8
10
Not enough data
8.3
10
Not enough data
9.2
11
Analysis
Not enough data
8.7
9
Not enough data
8.5
10
Not enough data
9.1
9
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
9.0
10
Not enough data
Monitoring
9.0
10
Not enough data
9.2
10
Not enough data
8.5
10
Not enough data
8.8
10
Not enough data
9.0
10
Not enough data
Remediation
9.3
10
Not enough data
9.5
10
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
8.6
24
7.7
5
Generative AI
8.6
23
7.7
5
Mobile Application ManagementHide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Agentic AI - Mobile Application Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Autonomous Endpoint Management (AEM)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Generative AI - Autonomous Endpoint Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Management - Autonomous Endpoint Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Device Management (MDM)Hide 18 FeaturesShow 18 Features
8.6
81
Not enough data
Platform - Mobile Device Management (MDM)
8.7
64
Not enough data
Operating System
8.7
63
Not enough data
8.4
61
Not enough data
8.5
63
Not enough data
Management
8.5
68
Not enough data
8.7
61
Not enough data
8.5
61
Not enough data
8.8
56
Not enough data
8.0
63
Not enough data
Security
8.9
67
Not enough data
9.0
66
Not enough data
Agentic AI - Mobile Device Management (MDM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enterprise Mobility ManagementHide 21 FeaturesShow 21 Features
9.0
45
Not enough data
Platform
9.0
32
Not enough data
8.9
34
Not enough data
8.9
34
Not enough data
Operating System
8.7
31
Not enough data
8.9
29
Not enough data
9.3
31
Not enough data
Security
9.3
35
Not enough data
9.1
29
Not enough data
9.1
34
Not enough data
Management
9.0
35
Not enough data
9.1
33
Not enough data
9.2
34
Not enough data
9.2
32
Not enough data
8.4
33
Not enough data
Agentic AI - Enterprise Mobility Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
IBM MaaS360
IBM MaaS360
WithSecure Elements Endpoint Protection
WithSecure Elements Endpoint Protection
IBM MaaS360 and WithSecure Elements Endpoint Protection are categorized as Endpoint Protection Platforms and Endpoint Management
Reviews
Reviewers' Company Size
IBM MaaS360
IBM MaaS360
Small-Business(50 or fewer emp.)
22.5%
Mid-Market(51-1000 emp.)
44.4%
Enterprise(> 1000 emp.)
33.1%
WithSecure Elements Endpoint Protection
WithSecure Elements Endpoint Protection
Small-Business(50 or fewer emp.)
35.5%
Mid-Market(51-1000 emp.)
43.0%
Enterprise(> 1000 emp.)
21.5%
Reviewers' Industry
IBM MaaS360
IBM MaaS360
Information Technology and Services
20.8%
Banking
6.7%
Computer Software
6.2%
Computer & Network Security
5.1%
Hospital & Health Care
4.5%
Other
56.7%
WithSecure Elements Endpoint Protection
WithSecure Elements Endpoint Protection
Computer Software
19.4%
Information Technology and Services
16.1%
Computer & Network Security
9.7%
Food & Beverages
5.4%
Banking
3.2%
Other
46.2%
Alternatives
IBM MaaS360
IBM MaaS360 Alternatives
Jamf
Jamf
Add Jamf
Hexnode
Hexnode
Add Hexnode
ManageEngine Mobile Device Manager Plus
ManageEngine Mobile Device Manager Plus
Add ManageEngine Mobile Device Manager Plus
Scalefusion
Scalefusion
Add Scalefusion
WithSecure Elements Endpoint Protection
WithSecure Elements Endpoint Protection Alternatives
ThreatDown
ThreatDown
Add ThreatDown
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Add Symantec End-user Endpoint Security
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Discussions
IBM MaaS360
IBM MaaS360 Discussions
What is IBM MaaS360 with Watson?
2 Comments
Sindhuja G.
SG
IBM MaaS360 with Watson is a cloud-based solution that combines Unified Endpoint Management (UEM) with AI-powered insights. It helps organizations manage and...Read more
Android Enterprise
1 Comment
JH
Hi Bryn, this could be a limitation you are experiencing related to your organizations licensing agreement with IBM. I would recommend contacting your...Read more
Is there a way to ensure no registered devices can connect to an unsecured wi-fi network?
1 Comment
JH
Yes. MaaS360 has a broad assortment of policy configurations available to customers, including the ability to mandate whether or not a device can connect...Read more
WithSecure Elements Endpoint Protection
WithSecure Elements Endpoint Protection Discussions
With F-Secure I can block malware and threats from devices like pendrive
1 Comment
Rodney K.
RK
I am not sure about the virus or malware called pendrive but I've been using F-Prot since 1998 and fortunately have not had a virus infect my computer since...Read more
What does F Secure protect?
1 Comment
Official Response from WithSecure Elements Endpoint Protection
WithSecure™ (formerly F-Secure) Elements Endpoint Protection blocks advanced, automated and targeted threats like ransomware, exploits and fileless attacks....Read more
Monty the Mongoose crying
WithSecure Elements Endpoint Protection has no more discussions with answers