We performed a comparison between BeyondTrust Endpoint Privilege Management and Check Point Harmony Endpoint based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The implementation is quite easy because the documents are always online."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"Reduces major vulnerabilities by removing local administrator privileges."
"I find the solution’s features like section management, password management, and analytics valuable."
"The product is secure."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"We have found the stability to be very reliable."
"We love the reports and monitoring they provide."
"Check Point Harmony Endpoint can be easily deployed and is cost effective and more secure."
"The rollout and management of devices were very simple."
"It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution."
"I have found the Zero phishing and IPS features the most useful in Check Point Harmony Endpoint. Additionally, threat emulation sandboxing is effective."
"Harmony's endpoint sandboxing is really good."
"The most valuable features of the solution are web protection and threat prevention."
"It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then."
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
"Reports to the end user."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"We faced some challenges with remote desktop sessions."
"Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"Its guides are identical to the existing ones. These guides should be updated and they should improve their design."
"Technical support needs to be improved, along with the response time."
"The solution could improve VPN functionality and the VPN user-interface."
"The solution needs more alerts to warn of attacks."
"It blocks safe URLs sometimes when there are network interruptions."
"Check Point users a pattern-based security module, which is something that can be improved."
"I would like to see is this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses."
"They should provide bandwidth regulation, so we can monitor and regulate bandwidth."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 28 reviews while Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 104 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Check Point Harmony Endpoint is rated 8.8. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business, Cortex XDR by Palo Alto Networks and SentinelOne Singularity Complete.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.