# ManageEngine Reviews
**Vendor:** Zoho  
**Category:** [AWS Marketplace Software](https://www.g2.com/categories/aws-marketplace)  
**Average Rating:** 4.5/5.0  
**Total Reviews:** 1
## About ManageEngine
ManageEngine&#39;s Vulnerability Manager Plus is a prioritization-focused vulnerability management software for enterprises offering built-in patch management.




## ManageEngine Reviews
  ### 1. ManageEngine is revolutionizing vulnerability scanning and management

**Rating:** 4.5/5.0 stars

**Reviewed by:** Steve S. | Chief Information Security Officer, Mid-Market (51-1000 emp.)

**Reviewed Date:** November 30, 2022

**What do you like best about ManageEngine?**

Most vulnerability scanning solutions follow the Nessus/OpenVas, CVE-centered approach where security personnel must wade through a hip-deep list of detected issues to solve, each one requiring research and many duplications in the mix.  ME has turned this on its head by taking the CVE's under the hood and delivering an agent-based settings audit that returns most detected issues in the form of automated fixes that can be approved en masse or individually and once per device.  Then they also seamlessly integrate CIS benchmarks and both OS and 3rd party software patching for a complete system hardening and INvulnerability maintenance solution that cuts down on so much extra security work.  All this is wrapped up in competitive licensing tied to users rather than devices, so a growing company can afford to achieve mass, cost-effective hardening across their infrastructure, Windows and Linux in my case (I haven't tested Macintosh).

Automated patching in the form of highly-customizable test & approve-after-x-days cycles keep systems current and automated reports show continuous state of compliance.  Out of the box, various locations and custom groups allow MSP-level partitions for customized security levels.

Support is excellent and responsive.

**What do you dislike about ManageEngine?**

The only thing I think is missing is an ability to roll back settings.  I can understand patches can't necessarily be rolled back easily by 3rd party software, but a record of settings should be kept so when I harden a system I can quickly roll it back if functionality is lost.  In one case I hardened a Ubuntu system so completely I couldn't get into it in any way even through root-level recovery.

I've worked around this issue by taking images of systems I'm hardening, and by pre-hardening my deployment templates rather than building fully-functional systems and then hardening.  I also have dev/test systems I deploy hardening principles to first in order to minimize any production impact.

**What problems is ManageEngine solving and how is that benefiting you?**

Before ME Vulnerability Manager, our vulnerability scanning was always a scramble to stay on top of, and never seemed to be fully complete.  Demonstrating our management was also problematic as reporting on sampled systems required gleaning information out of the mass of detail rather than a clean report showing a system's concise and specific history.



- [View ManageEngine pricing details and edition comparison](https://www.g2.com/products/zoho-manageengine/reviews?section=pricing&secure%5Bexpires_at%5D=2026-05-21+05%3A32%3A44+-0500&secure%5Bsession_id%5D=d981603e-4c98-47c9-8830-0f33128ecae7&secure%5Btoken%5D=a73445979e6b216d070ab0053d473104e9ec3e62b0b66306fbec91927b7db425&format=llm_user)

## ManageEngine Features
**Agentic AI - AWS Marketplace**
- Autonomous Task Execution
- Multi-step Planning
- Cross-system Integration


