Recently, I have been analysing the results produced from the same prompt in carious AI services. After having the various AI services generate answers I compared their value using Copilot Researcher. To provide an alternate analysis of the articles I used Gemini Deep Research and received the following analysis, summarised here:
————————–
The seven articles provided by the user all arrive at a similar, well-reasoned conclusion regarding the strategic superiority of M365 Business Premium for the typical SMB. However, they vary in their clarity, depth, and how well they frame the discussion for a business-focused audience. The ranking below is based on an assessment of these qualitative factors, determining which AI tool provided the most valuable and actionable report for an SMB owner.
Ranking Criteria
- Clarity & Structure: How easy is the argument to follow? Is the report well-structured and free of jargon?
- Comprehensiveness: Does the report cover all key aspects of both solutions and the modern security landscape?
- Depth of Insight: Does the report go beyond a simple feature list to discuss total cost of ownership, strategic alignment, and the new security model?
- Actionability: Does the report provide a clear, practical recommendation for the SMB owner?
AI Tool Rankings – M365 vs Hardware Firewalls
| AI Tool | Rank | Justification | Key Strength |
|---|---|---|---|
| Gemini (Deep Research) | 1 | The article is a near-perfect strategic analysis, framing the decision from a business perspective. It provides the crucial total cost of ownership (TCO) discussion and, uniquely, identifies the critical PCI DSS exception, which demonstrates a high degree of nuance and awareness of a real-world business constraint. | Exceptional strategic framing and business-centric analysis. |
| Copilot Researcher | 2 | The article provides a highly structured and detailed summary. Its strength lies in its comprehensive breakdown of the limitations of traditional firewalls, using clear, bulleted points that are easily digestible for a busy executive. The logical flow of the argument is excellent, making it very easy to understand why the old model no longer works. | A comprehensive and highly structured breakdown of the problem. |
| Copilot Studio (with GPT-5 reasoning) | 3 | This output provides a very strong, detailed breakdown of the specific M365 Business Premium components. It excels at explaining how each component directly replaces a traditional perimeter security function. The argument is well-reasoned and authoritative, linking the new tools to the Zero Trust model. | Outstanding detail on the M365 BP components and their function. |
| Deepseek (Deep Research) | 4 | This article is notable for its use of the powerful “firewall in the cloud” metaphor, which effectively communicates the strategic shift to a non-technical audience. It clearly outlines how M365 BP provides specific feature replacements, such as web content filtering and intrusion prevention, making the report very practical. | Effective use of a powerful metaphor to simplify a complex topic. |
| M365 Copilot (GPT) | 5 | This article introduces the “thin-edge, strong-endpoint” security model, a key strategic concept that refines the discussion beyond a simple comparison. It provides a solid summary of how cloud and endpoint controls outperform older, perimeter-based setups in terms of TCO and risk reduction. | Introduction of a key strategic model for modern security. |
| ChatGPT (Deep Research) | 6 | This article is a solid, albeit slightly more generic, summary of the core arguments. It is comprehensive and includes the key components of M365 BP that are relevant to the comparison, but it lacks the more granular, strategic framing seen in the higher-ranked outputs. It’s a good starting point but not as definitive as the others. | A solid, comprehensive overview of the core points. |
| ChatGPT | 7 | This output is the most list-based and least narrative of the group. While it accurately lists the advanced security controls in M365 BP, it is more of a feature catalog than a strategic report. It does not provide the same level of business context or direct analysis of the TCO and strategic alignment as the others, making it less valuable for an executive decision-maker. | Good at categorizing and listing the specific security controls. |
3 thoughts on “An alternate analysis of AI services”