User Reviews of BeyondTrust Endpoint Privilege Management & CyberArk Privileged Access Manager

Updated March 2024

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE report comparing BeyondTrust Endpoint Privilege Management and CyberArk Privileged Access Manager based on reviews, features, and more!

Where should we email your report?






BeyondTrust Endpoint Privilege Management review

Marlin B Pohlman
Marlin B Pohlman
Consultant at Visdom
Admin rights can be granted and revoked within minutes and that is what everything...
The most important factor is the ability to invoke least privilege, which is required under 27701 and GDPR. We have used the solution to remove users' administrative rights and instead provide on-demand, token-based administrative rights. The latter is an option for a single, temporary increase in privileges for a trusted user for a...
CyberArk Privileged Access Manager review

SatishIyer
SatishIyer
Assistant Vice President at a financial services firm with 10,001+ employees
Lets you ensure relevant, compliant access in good time and with an audit trail,...
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a...

Since 2012, we've had 767,667 professionals use our research.

As seen in