


Perforce Puppet and BMC TrueSight Server Automation are major players in the IT automation and management field. Perforce Puppet stands out due to its adaptability and flexibility in open-source applications, whereas BMC TrueSight Server Automation is noted for its comprehensive automation features and enhanced security measures.
Features: Perforce Puppet excels in the creation and deployment of agent-based configurations, real-time reporting, and comprehensive infrastructure management capabilities. It supports various types of packages and operating systems, making it versatile for IT environments. BMC TrueSight Server Automation offers extensive automation for compliance, patching, and integration across different operating systems. It is structured to provide solutions like role-based access control and the ability to do fast, recurring patch deployments.
Room for Improvement: Perforce Puppet may benefit from enhanced out-of-the-box solutions to compete with more comprehensive automation tools. Its user interface might require simplification to facilitate easier adoption for new users. Expanding its library of pre-built modules could also enhance usability for complex applications. BMC TrueSight Server Automation could improve by refining its deployment process to reduce complexity and time required. It can also enhance user experience through a more intuitive interface and expanded community support to aid with complex troubleshooting.
Ease of Deployment and Customer Service: Perforce Puppet is known for a straightforward deployment process with community-supported resources, providing ease for rapid implementations. Its extensive community support aids practitioners in maximizing the tool’s capabilities quickly. BMC TrueSight Server Automation, while featuring a more complex deployment process, offers structured service and excellent customer support, which is highly beneficial for organizations handling intricate enterprise-level needs.
Pricing and ROI: Perforce Puppet features a pay-as-you-go pricing model that is attractive for smaller enterprises or those requiring flexibility, offering a quick return on investment by minimizing upfront costs. BMC TrueSight Server Automation demands a higher initial investment, providing significant ROI through its expansive feature set that saves time and reduces manual labor expenses in the long term.
| Product | Mindshare (%) |
|---|---|
| Microsoft Intune | 6.9% |
| BMC TrueSight Server Automation | 3.4% |
| Perforce Puppet | 3.8% |
| Other | 85.9% |

| Company Size | Count |
|---|---|
| Small Business | 124 |
| Midsize Enterprise | 53 |
| Large Enterprise | 168 |
| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 5 |
| Large Enterprise | 15 |
| Company Size | Count |
|---|---|
| Small Business | 10 |
| Midsize Enterprise | 1 |
| Large Enterprise | 4 |
Microsoft Intune is a cloud-based service designed for device management, security, and compliance. It supports automation and facilitates endpoint management for Windows, iOS, and Android devices, ensuring data protection and efficient policy enforcement.
Microsoft Intune offers seamless integration with tools like Windows Autopilot to automate device setup and deployment. Integrated with Azure Active Directory, it enhances policy management while providing robust reporting and analytics tools for compliance tracking. Despite its intuitive interface aimed at simplifying navigation and device security management, there are challenges such as compatibility issues with Linux and Mac, limited policy support for Android, and demands for better third-party integration. It's widely used for both corporate-owned devices and BYOD scenarios in dynamic IT environments.
What are the key features of Microsoft Intune?In industries such as finance and healthcare, Microsoft Intune is implemented to ensure data protection and compliance with regulatory standards. Manufacturing sectors utilize Intune for managing a distributed workforce across global locations, while educational institutions employ it to secure and manage devices in learning environments supporting both students and faculty.
BladeLogic Server Automation allows you to quickly and securely provision, configure, patch, and maintain physical, virtual, and cloud servers.
· Threat remediation: Combine with BMC SecOps Response Service to link vulnerabilities to identified patches and create a remediation plan
· Compliance: Integrates role-based access control, pre-configured policies for CIS, DISA, HIPAA, PCI, SOX, NIST, and SCAP, documentation, and remediation
· Provisioning: Supports unattended installs and image-based, script-based, or template-based provisioning
· Configuration: Consistently manage change and configuration activities across a broad range of server environments with one tool
· Reporting: Assess change impact or complete an audit using multiple dashboard views
· Patching: Supports and follows maintenance window guidelines to ensure timely delivery of patches
Perforce Puppet offers automated configuration management and diverse platform support through agent-based functionality, enhancing systems with real-time reporting and efficient process automation.
Perforce Puppet provides comprehensive management for both infrastructure and applications, primarily on-prem servers, enabling automation of server updates, security compliance, and IT operations. It supports Linux and is expanding to Windows, facilitating continuous checks and compliance monitoring. With robust Internet-based features, scalability, role-based access control, and exemplary community support, it streamlines processes like remote package installation, file distribution, and user creation. Using Puppet Forge modules enhances its capabilities despite its steep learning curve and reliance on Ruby and DSL. While GUI limitations necessitate command line proficiency, its integration features and high cost can be a deterrent, prompting some to consider alternatives or the community version.
What are the key features of Perforce Puppet?Perforce Puppet is widely adopted in industries requiring rigorous configuration management and provisioning for on-prem servers. Enterprises automate IT operations and security compliance, applying it initially to Linux servers and progressing to Windows. It aids in public configurations for nodes, enabling efficient network, package, and software integrations while automating configuration and patch management processes.
We monitor all Configuration Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.