We performed a comparison between BeyondTrust Endpoint Privilege Management and Cisco ISE (Identity Services Engine) based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"Scalability is good. I would rate the scalability a nine out of ten."
"The tool is easy to use and deploy. It has PAM capabilities like privilege access. The solution helps with the management of third parties and vendors. It is an effective solution compared to other alternatives."
"The solution's technical support is good."
"What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"The product is secure."
"We have multiple metal devices from different places that use management, so we need to know who would be accessing all those devices and what changes are being done to those metal devices. With Cisco ISE we have visibility of all the changes happening on those devices."
"Cisco ISE now competes with any other product in the space because of its centralized and unified highly secure access control with ISE."
"The most valuable feature is AnyConnect Posture because it scans all the programs on the workstation and checks if the antivirus is up to date, as well as the cryptographic keys on our SSD."
"They provide you multiple ways to achieve security, not only on-prem, but also when you have remote and guest workers. Especially post-pandemic, a lot of our customers have remote workers. So, it has been really helpful."
"It is stable and easy to use."
"The WiFi portal in Cisco ISE is very useful for WiFi customers."
"RADIUS is the best feature because it supplies authentication to our entire campus."
"Since migrating towards doing wired ports over ISE with 802.1X and MAB authentication, our organization's security risk has been better. We have been able to establish better layouts, so devices can move and we don't have to worry about where they need to go."
"We faced some challenges with remote desktop sessions."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"Their technical support could be more responsive and helpful."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"The product should improve its price."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"Cisco ISE has numerous features that are impractical, and I won't utilize them since they require payment."
"The support could be faster and the pricing could be reduced."
"The solution can lag somewhat as we have a large database."
"Cisco ISE does not recognize devices and that is an issue we faced during its integration with our existing devices."
"The policies could be adjusted to make them more easily implementable."
"Segmentation can be improved."
"The interface is a little bit complex."
"We would definitely like to see a little bit of an improvement in the web GUI navigation. Some of the things are a little bit hidden in the drop-down menu. If we could get a way to get to those quicker, it'd be much more useful."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
More Cisco ISE (Identity Services Engine) Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 28 reviews while Cisco ISE (Identity Services Engine) is ranked 1st in Network Access Control (NAC) with 138 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Cisco ISE (Identity Services Engine) is rated 8.2. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Cisco ISE (Identity Services Engine) writes "Gives us that extra ability to assist the end user and make sure that we are making them happy". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, CyberArk Privileged Access Manager, Delinea Secret Server, ARCON Privileged Access Management and Microsoft Defender for Endpoint, whereas Cisco ISE (Identity Services Engine) is most compared with Aruba ClearPass, Fortinet FortiNAC, Forescout Platform, CyberArk Privileged Access Manager and Portnox CORE.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.