We performed a comparison between BeyondTrust Endpoint Privilege Management and Check Point Antivirus based on real PeerSpot user reviews.
Find out in this report how the two Anti-Malware Tools solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Scalability is good. I would rate the scalability a nine out of ten."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"The tool is easy to use and deploy. It has PAM capabilities like privilege access. The solution helps with the management of third parties and vendors. It is an effective solution compared to other alternatives."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
"The implementation is quite easy because the documents are always online."
"The product is secure."
"There is a lot of documentation to be able to use this security feature in the best way using the best practices indicated by the manufacturer."
"What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment."
"The solution offers multiple features in one solution, along with data detection."
"It is a very reliable antivirus."
"The virus detection models orchestrate real-time monitoring of data with reliable reporting information."
"It is very easy to manage the Antivirus blade, even for newcomers in our technical support team, which is a key area of interest for us."
"It has an inbuilt AI system that helps in diffusing the virus in a proactive manner and protects the system from getting damaged at the worst level."
"Check Point Antivirus is easy to configure."
"We faced some challenges with remote desktop sessions."
"They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment."
"How the accounts are presented in the solution's UI can be improved."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"The antivirus could be improved in terms of the resources it consumes, particularly regarding CPU and memory usage. We've encountered issues with some of our firewalls, leading us to turn off the antivirus feature due to its heavy resource consumption."
"We'd like to see better integration with other security tools."
"What's missing in Check Point Antivirus is the EDL feature."
"The product should improve its pricing."
"They must focus on performance and efficiency since this tool sometimes consumes many machine resources and leads to machine performance problems."
"The biggest thing would be the ability to update the SMO's and gateways through Gaia instead of always completing it through the command line."
"I would like to be able to see this integration of device analysis and verification - not just in native-integrated solutions - for Linux and iOS mobile devices, which are today a part of the larger group of devices and solutions that we have available."
"We need the ability to integrate this solution with the other existing solutions, such as Harmony."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 12th in Anti-Malware Tools with 28 reviews while Check Point Antivirus is ranked 6th in Anti-Malware Tools with 50 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Check Point Antivirus is rated 8.6. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Check Point Antivirus writes "Compatible, cost-effective, and highly customizable". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Check Point Antivirus is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, ESET Endpoint Protection Platform, VirusTotal and Microsoft Exchange Online Protection (EOP). See our BeyondTrust Endpoint Privilege Management vs. Check Point Antivirus report.
See our list of best Anti-Malware Tools vendors.
We monitor all Anti-Malware Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.