We performed a comparison between BeyondTrust Endpoint Privilege Management and Symantec Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"The implementation is quite easy because the documents are always online."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"The tool is easy to use and deploy. It has PAM capabilities like privilege access. The solution helps with the management of third parties and vendors. It is an effective solution compared to other alternatives."
"I find the solution’s features like section management, password management, and analytics valuable."
"The interface is very friendly, colorful, and bold."
"It will provide us with more security."
"The two factor authentication, and the single most important capability was it supported PIV and CAC as one of the two factors. That was pretty huge for us."
"Transparent login for users of privileged IDs (Linux, Windows). This prevents sharing of the password because it is never seen."
"It is great for identity governance."
"One of the key things for us about the product is around its simplicity. Being able to put in the technology that allows the business to remove complexity and also allow the security improvements."
"We found that the architecture is scalable and very resilient."
"CA PAM is working well for us."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
"How the accounts are presented in the solution's UI can be improved."
"They need to come up with better integrative options which should be customer-centric."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"Bring more technology into the portfolio and being able to collapse those products into a much more integrated way."
"I wish it could create local accounts on desktops."
"It'd be great if you just stuck in your PIV card and Windows popped up, asked you for your password. You typed it in, then it remembered your credentials."
"The management console could be improved."
"The service account management functionality needs to be extended to application pools, SQL database, PowerShell scripts, service account discovery, etc."
"The setup is complex."
"We experience stability issues after every patch upgrade. This is a place where CA needs to improve drastically."
"We have to do a lot of manual work to automate features."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
More Symantec Privileged Access Manager Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 28 reviews while Symantec Privileged Access Manager is ranked 18th in Privileged Access Management (PAM) with 50 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Symantec Privileged Access Manager is rated 7.8. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Symantec Privileged Access Manager writes "Allows IT and consultants to access the infrastructure environment but needs more security and better support". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and WALLIX Bastion, whereas Symantec Privileged Access Manager is most compared with CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), ARCON Privileged Access Management and Delinea Secret Server. See our BeyondTrust Endpoint Privilege Management vs. Symantec Privileged Access Manager report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.