Since 2004, Mandiant has been a partner to security-conscious organizations. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.
N/A
NinjaOne
Score 9.1 out of 10
N/A
NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over endpoints. The NinjaOne endpoint management platform increases productivity for IT teams and managed service providers, and comes with unlimited onboarding, training, and support.
N/A
Pricing
Mandiant Advantage Attack Surface Management
NinjaOne
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Mandiant Advantage Attack Surface Management
NinjaOne
Free Trial
Yes
Yes
Free/Freemium Version
Yes
No
Premium Consulting/Integration Services
Yes
No
Entry-level Setup Fee
Required
No setup fee
Additional Details
—
NinjaOne is a subscription service with a charge rate per month. For more detailed pricing information, contact NinjaOne directly to request a demo or to start 14-days free trial.
More Pricing Information
Community Pulse
Mandiant Advantage Attack Surface Management
NinjaOne
Features
Mandiant Advantage Attack Surface Management
NinjaOne
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Mandiant Advantage Attack Surface Management
7.7
1 Ratings
3% below category average
NinjaOne
-
Ratings
Network Analytics
8.21 Ratings
00 Ratings
Threat Recognition
7.31 Ratings
00 Ratings
Vulnerability Classification
7.31 Ratings
00 Ratings
Automated Alerts and Reporting
8.21 Ratings
00 Ratings
Threat Analysis
8.21 Ratings
00 Ratings
Threat Intelligence Reporting
6.41 Ratings
00 Ratings
Automated Threat Identification
8.21 Ratings
00 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
Mandiant Advantage Attack Surface Management
7.6
1 Ratings
6% below category average
NinjaOne
-
Ratings
IT Asset Realization
8.21 Ratings
00 Ratings
Authentication
7.31 Ratings
00 Ratings
Configuration Monitoring
8.21 Ratings
00 Ratings
Web Scanning
6.41 Ratings
00 Ratings
Vulnerability Intelligence
8.21 Ratings
00 Ratings
Monitoring Tasks
Comparison of Monitoring Tasks features of Product A and Product B
Mandiant Advantage Attack Surface Management
-
Ratings
NinjaOne
8.9
41 Ratings
18% above category average
Remote monitoring
00 Ratings
8.838 Ratings
Network device monitoring
00 Ratings
7.536 Ratings
Activity Monitoring
00 Ratings
8.424 Ratings
Management Tasks
Comparison of Management Tasks features of Product A and Product B
Many companies that have an presence can benefit from using Mandiant ASM to identify and manage their internet facing assets, like web servers, email servers and DNS servers. This helps reduce the risk of cyberattacks targeting these assets.However smaller organizations with exposure might not always need the extensive attack surface monitoring provided by Mandiant ASM. For example a small company with one website may not require much monitoring, as a larger corporation.
I think it is appropriate to use NinjaOne for Medium sized businesses. We feel like it can handle our environment of 300 machines. The ticketing system integrating with devices and monitoring is a plus for us since we don't need another third party integration to connect the two. NinjaOne patching could use improvement but they have built up a lot of other pieces of their infrastructure.
Mandiant ASM combines sources of information such, as assets through the internet cloud resources and suppliers from third parties. This comprehensive approach provides organizations with an understanding of their external attack surface.
With scanning Mandiant ASM identifies threats and vulnerabilities present on the external attack surface and promptly notifies users. Whenever a new threat or vulnerability is detected an alert is generated to empower enterprises to take action in mitigating the risks.
Mandiant ASM assesses risks based on their likelihood of exploitation impact on organizations and severity. This prioritization enables organizations to focus their efforts, on addressing the risks effectively.
Remote connections: the NinjaRemote client is spectacular and very easy to use and navigate. It quickly connects to customer systems so my engineers are able to work. As a bonus, they also offer a really good mobile app to connect to client systems.
Antivirus: Bitdefender Endpoint Protection is built directly into the NinjaOne portal. This makes deploying and maintaining AV very easy.
OS Patching: NinjaOne makes it very easy to handle patching across multiple clients and locations. It is very easy to use and doesn't take long to set up.
Support: NinjaOne support is always very prompt and helpful.
Documentation: the NinjaOne Dojo is a one-stop shop for all of your FAQs, guides, and forum needs. You can find almost anything here to help you deploy and maintain NinjaOne.
Automation Library: NinjaOne comes preloaded with a large number of ready-to-go automations. They also provide you with a scripting module to create your own.
To enhance user experience it would be beneficial to make the interface more user friendly and easier to navigate. This can be achieved by simplifying the layout offering help when needed and utilizing terminology that's easily understandable.
Additionally incorporating reporting features that are customizable will empower users to generate reports tailored to their individual requirements.
In order to enhance the solutions efficiency optimizing the code and implementing data structures would prove valuable.
We already did. After evaluating many platforms, we found the cybersecurity of the company, its development direction, and the performance of the platform to be far superior at its price point.
Ninja's interface is clean and simple. Overall usability from an interface perspective is good. Some items, policies and scripting for instance, are a bit cumbersome and it's really not clear how to implement with a best practice mind-site. Ninja RMM got the job done for us but as we pushed our needs more into automation and efficiency we felt it wasn't keeping up with our speed of growth. There is definitely usability in the product, and it will get the job done, but there are other RMM's out there that fit better in our business.
Support has been very responsive and my account rep Brian K. has communicated with me continuously making sure we had everything we need. Not like other MDMs where they sign you up and that's the last you hear from them. NinjaOne makes sure you use the product to its best application and you are successful and continue as the product features grow.
Easy to learn and all of the functions and features were easy to learn. Once I started learning all of the features and functions, it made my everyday tasks much easier and more productive. The user interface is very easy to use. If I did have any questions, the Ninja Dojo was a big help.
It was nice and self paced learning. The sections were easy to understand and the functionality was very worthwhile. The online training was very easy to learn and intuitive. I did not feel the need to ask for any clarification or assistance with any of the sections. I am still learning a lot of the functions but fined it very easy to use.
I decided to go with Mandiant Advantage Attack Surface Management because it offers a range of features performs excellently and is easy to use. What I really appreciate about Mandiant is their commitment, to innovation and their proven track record, in ensuring security.
NinjaOne's user friendly interface was immediately appealing to a team that that needs to be able to pickup a tool and know how to run with it at first exposure. From the moment we started using it, we would often be able to navigate the platform with a common sense approach and be able to navigate to exactly what we were looking for without requiring documentation or guidance. Customer representatives that we have worked with have all been outstanding, and have not been pushy like some other vendors teams tend to be when you are initially debating between multiple offers.
Automation plays a role in saving time by streamlining operations related to attack surface management. These include automated asset discovery, vulnerability scanning and continuous monitoring of threat intelligence. As a result security teams can allocate their efforts towards projects such as security planning and incident response.
ASM provides a view of the external attack surface, for businesses encompassing internet facing assets, cloud resources and third party vendors. This enhances the understanding of assets enabling organizations to identify and prioritize risks effectively and make decisions on security investments
One notable advantage is cost savings. By eliminating the need to purchase and maintain security tools ASM becomes a solution for enterprises. It can replace products, like asset discovery tools, vulnerability management tools and threat intelligence feeds with its capabilities.