We performed a comparison between BeyondTrust Endpoint Privilege Management and Norton Security Premium [EOL] based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SentinelOne, ESET and others in Anti-Malware Tools."The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"Logs that get collected on the Privilege Management console from the agents are very good. They help us to identify the aspects from which we have to whitelist an application."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
"The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"The solution's technical support is good."
"The most valuable feature is the quick installation."
"The product is called Norton 360 all-in-one. It is a full product."
"Flexible antivirus and antimalware software. It also provides protection against ransomware. It's flexible, easy to handle, scalable, and stable."
"With the heightened security around phishing, identity theft, and malware, this is a good product."
"The most valuable feature is the multifunctional protection."
"Norton Security Premium is good, and it's pretty simple to install."
"The dashboard is good."
"It does not take many resources during scanning."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"If you don't get the implementation right at the outset, you will struggle with the product."
"The product should improve its price."
"It only has limited support for Mac."
"They need to come up with better integrative options which should be customer-centric."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then."
"Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful."
"Security Premium's cost could be lower."
"The product is an antivirus, it should be updated automatically when needed."
"It would be helpful for me if this solution works on our cloud backup data."
"I don't like the password manager of Norton Security Premium."
"During scanning, sometimes, there is a heavy load on the workstation. This needs to be improved."
"The solution can improve the security modules."
"Having a dashboard that shows the different functions of Norton Security Premium can convince end users that the software is more than just an antivirus solution. This product offers several features, but end users think that it's just one out of the box solution, because the different functions are not explained in detail."
"The product could always be more secure."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
More Norton Security Premium [EOL] Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 12th in Anti-Malware Tools with 27 reviews while Norton Security Premium [EOL] doesn't meet the minimum requirements to be ranked in Anti-Malware Tools with 13 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Norton Security Premium [EOL] is rated 8.8. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Norton Security Premium [EOL] writes "User-friendly solution with good blocking". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Norton Security Premium [EOL] is most compared with .
See our list of best Anti-Malware Tools vendors.
We monitor all Anti-Malware Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.