User Reviews of BeyondTrust Endpoint Privilege Management & IBM Security Secret Server

Updated March 2024

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE report comparing BeyondTrust Endpoint Privilege Management and IBM Security Secret Server based on reviews, features, and more!

Where should we email your report?






BeyondTrust Endpoint Privilege Management review

Marlin B Pohlman
Marlin B Pohlman
Consultant at Visdom
Admin rights can be granted and revoked within minutes and that is what everything...
The most important factor is the ability to invoke least privilege, which is required under 27701 and GDPR. We have used the solution to remove users' administrative rights and instead provide on-demand, token-based administrative rights. The latter is an option for a single, temporary increase in privileges for a trusted user for a...
IBM Security Secret Server review

reviewer1953252
Head of IT Security at a financial services firm with 5,001-10,000 employees
User-friendly, granular features, and is simple to implement, but the technical...
It requires customization, whereas out-of-the-box integrations do not. It takes a lot of coding and customization to integrate with so many different systems. It is not a networking device, it does not support the full proxy features for all PAM, or Privilege Access Management, access for any target systems. Other vendors have a full proxy...

Since 2012, we've had 767,847 professionals use our research.

As seen in