BeyondTrust Endpoint Privilege Management Competitors and Alternatives

Get our free report covering CyberArk, Thycotic, CyberArk, and other competitors of BeyondTrust Endpoint Privilege Management. Updated: December 2020.
455,164 professionals have used our research since 2012.

Read reviews of BeyondTrust Endpoint Privilege Management competitors and alternatives

reviewer1284300
Pre Sales/Technical Engineer at a tech services company with 11-50 employees
Real User
Top 5
Feb 19, 2020
Good user interface and session monitoring and easy to set up

What is our primary use case?

I primarily use the solution for PRAM management, privileged access management, and other similar tasks as well. We submit credentials and replicate and post them directly behind the scenes. There's also some session monitoring and issue recording, etc. that we handle.

Pros and Cons

  • "The user interface is quite good. It's very straightforward."
  • "There could be tweaks here and there. For example, instead of going to one main function to do this and another main function to do that, the solution could remap the user interface so that a person only has to go through one function. The way that function branches off should make a bit more sense."

What other advice do I have?

I have a lot of hands-on experience with the solution and I present it to customers and do all the POCs for them. I'd recommend the solution and advise others to look at cloud options, as most companies are moving to the cloud anyway right now. It's flexible, so users can deploy it both on-prem or on the cloud. There are lots of great custom features and network monitoring capabilities. You can also patch the privileged behavior and it will, on the fly, give you nice digital printouts with privileged behavior also. If your system admin or one of your admins suddenly acts strangely, even at 2…
reviewer1371597
Data Entry Specialist at a financial services firm with 1,001-5,000 employees
Real User
Jun 18, 2020
Good security with an easy initial setup and good stability

What is our primary use case?

We prefer not to talk about our use cases for security reasons.

Pros and Cons

  • "The initial setup is very straightforward. It's not complex at all."
  • "The solution needs more work on the password management side of things. Password management is a big challenge for us, and I would like to improve this aspect. We're finding that BeyondTrust is better in this regard, which is why we're probably going to migrate over. It will offer better security I think."

What other advice do I have?

We're customers; we don't have any relationship with the business. We're not a reseller or anything like that. We just use the product. Currently, we're using the solution. However, it's our intention to migrate to BeyondTrust in the near future. Currently, we are using the latest version of the solution. I'd like new users to know that the deployment really is quite straightforward, and it's easy to manage and troubleshoot. It's simple to restore the database within minutes if necessary as well. There are some great features that are available on the solution that makes it a worthwhile…
reviewer1384200
Threat Protection Architect at a consumer goods company with 10,001+ employees
Real User
Top 5Leaderboard
Jul 12, 2020
Guarantees the password is known by no one or for a maximum of eight hours

What is our primary use case?

Our primary use case is to control the technical accounts used in our DevOps environnment. The primary goal was to automate to the maximum all privileged accounts used by applications. It was a big issue because al dev guys were always using the same account/password couple. CyberArk is doing this for them transparently. Through time the scope was extended to all interactive users with the target to avoid them knowing the password. The automated password change was implemented to 99% of all accounts inside the company.

Pros and Cons

  • "The risk of lost password and forbidden access to resources has been drastically reduced which increased the security level for the entire company,"
  • "It needs better documentation with more examples for the configuration files and API/REST integration"

What other advice do I have?

Hard to implement and to get acceptance from the users and management. But when installed the solution is rock solid.
Get our free report covering CyberArk, Thycotic, CyberArk, and other competitors of BeyondTrust Endpoint Privilege Management. Updated: December 2020.
455,164 professionals have used our research since 2012.