We performed a comparison between BeyondTrust Endpoint Privilege Management and Symantec Identity Governance and Administration based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."Reduces major vulnerabilities by removing local administrator privileges."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"The solution's technical support is good."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"Logs that get collected on the Privilege Management console from the agents are very good. They help us to identify the aspects from which we have to whitelist an application."
"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording."
"Word mining and risk campaigns are the most valuable features of this solution."
"Connector Xpress and Policy Xpress and the new interface."
"It has improved our user management. It is definitely streamlined."
"Provisioning engine (on the back-end, separate from front-end components, that's part of layered architecture)."
"Automated provisioning removes manual labor and manual provisioning."
"It offers a nice price. It's mid-range."
"It has good endpoint support and endpoint connectivity to different versioning endpoints."
"The scalability potential is there if a company needs to expand."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"It only has limited support for Mac."
"Their technical support could be more responsive and helpful."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"They need to come up with better integrative options which should be customer-centric."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"We faced some challenges with remote desktop sessions."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"In the next release, there should be provisioning of your certifications."
"There are several areas for improvement in Symantec Identity Governance and Administration. They have no proper documentation on how to do backups. They also have a lengthy workflow process where we have to make some configurations to manage automation in the rules and in our tasks which takes time. We have to manually configure all the configuration files, and we cannot export users because there's no export system in Symantec Identity Governance and Administration. What we'd like to see in the next release of the solution is for them to make configuration and integration with other systems their top priorities. We have many API systems to manage, so hopefully, if they make these enhancements shortly, we can directly connect with our API systems when using Symantec Identity Governance and Administration."
"Reporting could be improved."
"The directory has room for improvement. Also, the dashboards and, in particular, the KPI dashboard that shows the current user’s information needs reworking."
"The product works slowly while accessing cloud-native solutions."
"The support from Symantec Identity Governance and Administration could improve."
"The reporting functions."
"A better information display for the approvals within the workflow would give them more information and the ability to comment back on a request as to why they're rejecting it. We've been telling them we'd like this improvement, and we hope to see it."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
More Symantec Identity Governance and Administration Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 28 reviews while Symantec Identity Governance and Administration is ranked 20th in Identity Management (IM) with 65 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Symantec Identity Governance and Administration is rated 7.6. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Symantec Identity Governance and Administration writes "Works well on-premises and has partial capabilities but lacks many feaures". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager and Delinea Secret Server, whereas Symantec Identity Governance and Administration is most compared with SailPoint Identity Security Cloud, AlertEnterprise Enterprise Guardian, SAP Identity Management, Cisco ISE (Identity Services Engine) and Saviynt.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.