BeyondTrust Endpoint Privilege Management Implementation Team

NN
Sr. Manager Cyber Security at a manufacturing company with 10,001+ employees

We did it by ourselves. In the initial deployment, it was a team of six or seven people. They came from different groups. We had group policy administrators, Windows administrators, and security administrators from my team. There was also the endpoint provisioning team that does the packaging work.

In the cloud migration, the same team was there, but we didn't have the Windows team and the admin team. That's because they weren't required from a group policy perspective. It mostly had security administrators. The packaging team was also very important. We also have a test team that does the validation from a testing perspective across a variety of endpoints in different regions. So, there were around six or seven people during the cloud migration.

View full review »
Pradeep Swain - PeerSpot reviewer
Information Technology System Analyst at a tech services company with 1,001-5,000 employees

The deployment was done in-house. Moreover, it will take time, actually. Let's say you are an expert. Maybe it will take months or two months to deploy.

View full review »
Sandeep Kundargi - PeerSpot reviewer
Technical Lead at a tech vendor with 10,001+ employees

The process involves several steps, starting with initial discussions to understand the existing infrastructure and identifying the necessary knowledge about the current state. Subsequently, approvals need to be obtained from relevant workflow departments based on the proposed changes. Once the groundwork is established, the next phase entails getting the servers up and running for it. The decision-making process then extends to choosing the appropriate deployment model, whether on-premises or in the cloud. For customers with the Password Safe, considerations regarding the Password Safe console come into play. This comprehensive approach ensures a thorough understanding of the client's requirements before making informed decisions about the deployment. Our process typically involves progressing from Proof of Concepts to real-time production deployment. The entire timeline for this transition spans approximately three months.

View full review »
Buyer's Guide
BeyondTrust Endpoint Privilege Management
April 2024
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
JA
System Administrator at MOI

We implemented the solution with the help of two or three executives and an integrator.

View full review »
AI
Technical Manager at Gulf IT

We do demonstrations for implementations only because we are partners for BeyondTrust in this region. We deploy the solution.

View full review »
it_user687237 - PeerSpot reviewer
Identity and Governance Access Lead

Vendor team. Very good.

View full review »
GK
VP Cyber Risk at a tech services company with 501-1,000 employees

We use a vendor team to implement.

View full review »
OS
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees

Our in-house team handled the deployment.

View full review »
OS
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees

We handled the deployment in-house with the help of our own team.

View full review »
Buyer's Guide
BeyondTrust Endpoint Privilege Management
April 2024
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.