We performed a comparison between BeyondTrust Endpoint Privilege Management and Tanium based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"Technical support is good."
"The solution's technical support is good."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"It scales easily and the product is stable."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"The implementation is quite easy because the documents are always online."
"The security features are very valuable."
"For incident response tasks, all these tasks can get done in minutes with minimal disruption to the end-user."
"The product is granular and can build complex roles compared to other EDR vendors."
"The solution is scalable and helps to understand how infrastructure works. It helps to improve the health of the organization."
"I like the tool's incident response and security patching."
"I would say Tanium is the best tool for vulnerability management."
"Tanium's most valuable feature is its instant discovery aspect."
"Tanium has made the process of detecting threats more proactive with its detection. So, the process is easier and more efficient."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"How the accounts are presented in the solution's UI can be improved."
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"The product should improve its price."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"The main issues are the network connection because different customers have issues with their networks. It's difficult implementing this type of solution because the network is the main feature in the architecture for these types of solutions. Tanium could improve by creating some network optimization."
"The solution can give a lot of false positives."
"Tanium’s scalability could be improved."
"We had some issues with the solution's OS upgrade."
"The most painful thing is the interface. It's a bit unclear sometimes."
"It is not really additional functions, or the features that are needed, rather the complexity would be reduced based on the number of modules required to put together a comprehensive operational security and risk compliance model."
"The reporting could be improved."
"Tanium's limitations should be improved because although it is a great tool, it is limited to only a few classes during a session."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 27 reviews while Tanium is ranked 36th in Endpoint Protection Platform (EPP) with 15 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Tanium is rated 7.4. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Tanium writes "Useful tool for vulnerability management and deploying applications, needing improvement in its OS upgrade". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Tanium is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, Microsoft Configuration Manager, Qualys VMDR and ServiceNow Discovery.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.