We performed a comparison between BeyondTrust Endpoint Privilege Management and One Identity Manager based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The solution's technical support is good."
"Reduces major vulnerabilities by removing local administrator privileges."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"Technical support is good."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"We have been able to make our help desk self-sufficient by giving them role-based access. We have been able to reduce service dependency by 40% to 50%."
"It is a flexible because it is customizable. It allows you to build anything on top of it."
"The most valuable features include the automated attestations or recertification... The time that people have to focus on their real jobs and not spend it doing recertifications is huge."
"Quest One IDM allows for large customization."
"The One Identity birthright process has helped generate user accounts more accurately and quickly."
"The most valuable features of this solution are its handling and that it is easy to maintain and manage the data."
"Nobody has to put people in AD groups by hand anymore. It goes automatically and that's very good. It's also very flexible. It's quite easy to customize and we have customized it a lot."
"It brings simplicity into complex matters."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"If you don't get the implementation right at the outset, you will struggle with the product."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"It only has limited support for Mac."
"We faced some challenges with remote desktop sessions."
"The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does."
"How the accounts are presented in the solution's UI can be improved."
"[Regarding] their upgrades, we're going to 8.12 right now and everything is running very smoothly but this is actually the first upgrade that has gone off well. Even the other "dots" have taken us six months or longer to get through QA testing."
"Some features aren't supported by the technical support. It is based on your own risk, which I can accept, but I would be happier if they would provide me some additional information about them anyway, e.g., deleting tables or columns."
"We are trying to get rid stability issues from the legacy version. We are now implementing version 8.2, which is so much better than version 6."
"The web interface has room for improvement. It could be more performant and the design of the web interface is relatively complicated. It could be simplified."
"The system role manager, or some of the roles that are inside Identity Manager, are limited to one user. It would be more flexible if these responsibility roles could be attached to many people."
"I would like them to enhance the search functionality to enable faster processing when looking for objects."
"There are a few aspects of One Identity Manager's user experience that could be improved."
"I would like to integrate automated testing with One Identity, and it would be great to have some support from the vendor on here."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 28 reviews while One Identity Manager is ranked 3rd in Identity Management (IM) with 77 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while One Identity Manager is rated 8.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of One Identity Manager writes "The JML is customizable but the support team isn't strong". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas One Identity Manager is most compared with SailPoint Identity Security Cloud, Oracle Identity Governance, EVOLVEUM midPoint, Cisco ISE (Identity Services Engine) and ForgeRock.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.