We performed a comparison between BeyondTrust Endpoint Privilege Management and IBM Security Identity Governance and Intelligence based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"Technical support is good."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"The tool is easy to use and deploy. It has PAM capabilities like privilege access. The solution helps with the management of third parties and vendors. It is an effective solution compared to other alternatives."
"Logs that get collected on the Privilege Management console from the agents are very good. They help us to identify the aspects from which we have to whitelist an application."
"Lifecycle management, governance and documentation."
"I would rate the price eight out of 10, with 10 as the best value for money."
More IBM Security Identity Governance and Intelligence Pros →
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"We faced some challenges with remote desktop sessions."
"How the accounts are presented in the solution's UI can be improved."
"Reports to the end user."
"It only has limited support for Mac."
"They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment."
"They need to come up with better integrative options which should be customer-centric."
"The solution is a bit pricey for some regions."
"Self service center is not always easy to understand."
More IBM Security Identity Governance and Intelligence Cons →
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
More IBM Security Identity Governance and Intelligence Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 28 reviews while IBM Security Identity Governance and Intelligence is ranked 11th in User Provisioning Software with 2 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while IBM Security Identity Governance and Intelligence is rated 7.6. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of IBM Security Identity Governance and Intelligence writes "We use the solution to ensure organizations conform to industry base certifications and best practices". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas IBM Security Identity Governance and Intelligence is most compared with SailPoint Identity Security Cloud, Microsoft Identity Manager, Saviynt and CyberArk Privileged Access Manager.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.