We performed a comparison between BeyondTrust Endpoint Privilege Management and Trellix Endpoint Security based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording."
"Technical support is good."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"Reduces major vulnerabilities by removing local administrator privileges."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"The initial setup is straightforward, not complex."
"The reporting capabilities are a valuable feature. In enables more visibility on our network."
"The solution is broken down into different components from the portals. Web filtering, which is an added feature has been great for us."
"I have found many of the features to be useful."
"It's easy to use."
"Trellix Security Endpoint can promptly isolate any host machines directly from the console. If alerts are received and isolation is necessary, it can be accomplished through the console. The console itself holds significant value, accessible through a browser and allowing remote actions via cloud login."
"The user behavioral analysis feature is great."
"It's quite easy to install agents."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"How the accounts are presented in the solution's UI can be improved."
"Its feature for establishing workflows needs improvement."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"The product should improve its price."
"If you don't get the implementation right at the outset, you will struggle with the product."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"There are more secure featured solutions from McAfee on the market but for smaller companies like ours, they are too expensive."
"The platform needs improvement in terms of handling heavy databases."
"The solution's documentation is not streamlined and is in bits and pieces, which should be in a single format."
"They can make it free, but that's not going to happen."
"We know that McAfee isn't the best antivirus and it can't protect us 100%, although we are okay with the level of protection that it gives us."
"It didn't work well for some of the use cases. We have different use cases for each entity. Their support is also not good and needs improvement."
"Tech support is not as helpful as they were in the past."
"Technical support from the vendor is very bad."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 27 reviews while Trellix Endpoint Security is ranked 10th in Endpoint Protection Platform (EPP) with 94 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Trellix Endpoint Security is rated 8.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Trellix Endpoint Security writes "Good user behavioral analysis and helpful patching but needs better support services". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Trellix Endpoint Security is most compared with Microsoft Defender for Endpoint, Trellix Endpoint Security (ENS), CrowdStrike Falcon, Cortex XDR by Palo Alto Networks and Trend Micro Deep Security.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.