Ivanti Endpoint Manager increases user and IT productivity by helping IT administrators gather detailed device data, automate software and OS deployments, and quickly fix user issues.
N/A
Ansible
Score 9.2 out of 10
N/A
The Red Hat Ansible Automation Platform (acquired by Red Hat in 2015) is a foundation for building and operating automation across an organization. The platform includes tools needed to implement enterprise-wide automation, and can automate resource provisioning, and IT environments and configuration of systems and devices. It can be used in a CI/CD process to provision the target environment and to then deploy the application on it.
We are currently looking and re-evaluating EPM against these competitive systems. Because our evaluation is starting again, I will come back to this question.
Ansible
No answer on this topic
Features
Ivanti Endpoint Manager
Red Hat Ansible Automation Platform
Configuration Management
Comparison of Configuration Management features of Product A and Product B
There is no direct replacement for the on-prem Ivanti [Unified Endpoint Manager (formerly LANDESK Management Suite)] solution. Ivanti has a companion product called Neurons, but that is in additional cost, and requires configuration with your on-prem [Unified Endpoint Manager] instance to perform basic functions. If cloud-based is a requirement for your organization, this is likely a dealbreaker. You can implement [Unified Endpoint Manager] in a cloud instance such as AWS, but the support for this appears limited. If on-prem is not an issue for you, this is a great tool for device management. It has robust features, impressive inventory, massive customization options, and excellent vendor support. If Patch Management is a problem in your company right now, this is the first product I would evaluate.
Red Hat Ansible automates server management, configuration updates, and deployments across our server infrastructure, keeping everything consistent, reducing human error, and saving time. Also provides detailed reports on what is done and uses role-based access controls to keep systems secure by controlling who can make changes.
Patch(Security) is done really well. You can use roll out projects or built-in automation as well as the use of groups and scopes to design pilot and other use cases.
It takes a solid inventory of what you have of your endpoints and can do an agentless scan as well if you need to collect data that way as well.
Provisioning is rather simple and even allows you to use other products' software for the image or the built-in if you wish to do so.
Software distribution works well and has a lot flexibility built into the module.
It reduces custom scripting efforts because everything can be scripted in simple, human-readable YAML playbooks.
Not only servers, but also network devices, VMs, Containers, Kubernetes clusters, etc., can be automated via Ansible, showcasing its extensive list of supported devices.
It is agentless, which makes it lightweight and allows for easy integration into CI/CD and GitOps pipelines.
Many Tier-1 telcos use Ansible for Day 0/1/2 automation of RAN, transport, and core infrastructure (e.g., network function lifecycle management, NE configuration push, patching VNFs).
Setup - Boy it is a pain to configure everything correctly. Be aware that you'll probably be giving an AD service account some God rights to get everything working....and security just loves that....
Cost - Boy you have to pay for everything. I suppose it lets you buy into just what you want but having repeated items go through procurement is a pain if your procurement branch is a pain.
I can't think of any right now because I've heard about the Lightspeed and I'm really excited about that. Ansible has been really solid for us. We haven't had any issues. Maybe the upgrade process, but other than that, as coming from a user, it's awesome.
We are happy with the product but the support and development process is far superior to any other company we have worked with. Having a good support structure is very important in today's marketplace of products that do so many things and have so many robust options and capabilities. We are very satisfied with our contract, pricing, support and product execution.
Even is if it's a great tool, we are looking to renew our licence for our production servers only. The product is very expensive to use, so we might look for a cheaper solution for our non-production servers. One of the solution we are looking, is AWX, free, and similar to AAP. This is be perfect for our non-production servers.
Items are logically laid out and most are easy to find. The more advanced stuff can be trickier, but it is still not hard to find. There are a lot of options though, so remembering where some settings are, especially if you do not alter them often, can take a minute, but you will get to them fairly qiickly.
It's overall pretty easy to use foe all the applications I've mentioned before: configuring hosts, installing packages through tools like apt, applying yaml, making changes across wide groups of hosts, etc. Its not a 10 because of the inconveinience of the yaml setup, and the time to write is not worth it for something applied one time to only a few hosts
Great in almost every way compared to any other configuration management software. The only thing I wish for is python3 support. Other than that, YAML is much improved compared to the Ruby of Chef. The agentless nature is incredibly convenient for managing systems quickly, and if a member of your term has no terminal experience whatsoever they can still use the UI.
TRM\TAM support has been generally very good. Getting reported bug fixes, design changes, UX problems resolved has been a pain. It is often difficult to get problems escalated beyond the TRM\TAM level. Support is fantastic when you can get it, getting it can often require more work than it should, and that is probably our biggest issue.
There is a lot of good documentation that Ansible and Red Hat provide which should help get someone started with making Ansible useful. But once you get to more complicated scenarios, you will benefit from learning from others. I have not used Red Hat support for work with Ansible, but many of the online resources are helpful.
It's been many years since I did a full evaluation of other products but at the time we purchased it, the main competitors were Microsoft's SMS and Alteris. SMS just looked horribly ugly and complicated (which fit in very well with Microsoft's other server tools) and Alteris looked okay but had a piecemeal approach where even a basic deployment meant purchasing a half dozen or more components. LANDesk had one bundle for all the tools we were looking for and had a great interface for presenting the data.
AAP compares favorably with Terraform and Power Automate. I don't have much experience with Terraform, but I find AAP and Ansible easier to use as well as having more capabilities. Power Platform is also an excellent automation tool that is user friendly but I feel that Ansible has more compatibility with a variety of technologies.
POSITIVE: currently used by the IT department and some others, but we want others to use it.
NEGATIVE: We need less technical output for the non-technical. It should be controllable or a setting within playbooks. We also need more graphical responses (non-technical).
POSITIVE: Always being updated and expanded (CaC, EDA, Policy as Code, execution environments, AI, etc..)