BeyondTrust Endpoint Privilege Management Other Advice

Marlin B Pohlman - PeerSpot reviewer
Consultant at Visdom

Hire someone who knows the standards and knows how to align the product against the standards. That ability is why you should buy this product. The product is really good for GDPR, HIPAA, and medical compliance. I also like it for risk reduction. I can take a customer that is non-compliant with 27001, an organization that failed their registrar audit, and get them to compliance with this product fairly quickly; in half a year. That's good.

Policy changes could be easier and better aligned with HITRUST and GDPR, although we can do them. We don't do a whole lot of whitelisting since everything we do is regulated. Part of what I have to do is all my own policy changes for the HITRUST GDPR.

View full review »
NN
Sr. Manager Cyber Security at a manufacturing company with 10,001+ employees

I would advise going for the cloud-based solution. The cloud-based solution has come a long way from its initial stage. 

It is a very simplified solution. Their licenses are very straightforward, simple, and accommodating. The support has been really good, and their flexible policy model has really been instrumental in going for a stage-by-stage approach. You don't have to go all the way to impact your environment from day one. You can define your policies using their quick policy wizard and other processes to simplify your environment. You should proceed step-by-step to get rid of the local admin and the environment. Evaluation with their simplistic and flexible model is going to make it much easier and faster for you to pick up the solution.

I would rate it a nine out of 10. There is always a scope for improvement.

View full review »
Mohammed-Talukdar - PeerSpot reviewer
Lead Cyber Security Architect at a tech services company with 10,001+ employees

Make sure you have a thorough understanding of your environment, assets, and applications before considering any product like BeyondTrust or CyberArk. If you don't understand your assets and the applications you're trying to protect, you may encounter issues.

Overall, I would rate the solution an eight out of ten. To push it to a ten, improvements in pricing and easier integration into legacy applications would be beneficial.

View full review »
Buyer's Guide
BeyondTrust Endpoint Privilege Management
March 2024
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
Lakshmi Prasada Reddy Nandyala - PeerSpot reviewer
Senior Consultant at Techdemocracy LLC

I would rate the solution an eight out of ten. You can deploy the solution to Azure, AWS, or on-premises. This solution will be very helpful for organizations for security purposes. The tool is very user-friendly. The solution’s graphic user interface is also very easy compared to other products.

View full review »
FA
Senior Specialist at a tech services company with 10,001+ employees

BeyondTrust Endpoint Privilege Management has the flexibility to enforce privilege across Windows and Mac endpoints as well as Unix and Linux machines, but I've only worked with Windows machines. So far, we have had a good experience.

I would recommend this product. It is a good product, but it needs to be more mature. Overall, I would rate it an eight out of ten.

View full review »
Pradeep Swain - PeerSpot reviewer
Information Technology System Analyst at a tech services company with 1,001-5,000 employees

I would advise if you're using BeyondTrust Endpoint Privilege Management for the first time, seek professional services directly from BeyondTrust, not from a vendor or supplier role. Take professional services directly from BeyondTrust EPM.

Overall, I would rate the solution an eight out of ten because I'm also missing something on the pricing side. I'm missing something on the configuration side. Those things are missing.

View full review »
YB
Software Consultant at a financial services firm with 5,001-10,000 employees

I suggest starting with AD Bridge and implementing it properly before installing the privilege management. Doing them together will be very difficult. First, enable the AD Bridge fully and make it available to all users, and then install Privilege Management.

I would rate it around eight out of ten.

View full review »
Sandeep Kundargi - PeerSpot reviewer
Technical Lead at a tech vendor with 10,001+ employees

When evaluating this product, it's more effective to base the assessment on your specific use cases rather than comparing it to other products. If the product aligns with ninety percent of your use cases and meets your needs, it would strongly indicate that proceeding with this product is a favorable choice. Overall, I would rate it eight out of ten.

View full review »
DS
Manager II, Cyber Operations at OPTIV

The solution is doing a good job of enhancing the endpoint security posture by managing the overall application life cycle and helping us block unwanted applications. The solution's scanning feature helps identify the unmanaged accounts within the console itself. We do not have to do a DNA scan like CyberArk separately, which is a separate license.

The solution's least privilege enforcement has helped us ensure access is given to only the required people. It is easy to maintain the solution.

The solution helps identify the unmanaged accounts and then develop a plan for managing those transferred accounts, which were used as service accounts in multiple critical applications.

Users should have an in-house person to manage the environment. If they completely depend upon the vendors, they might be unable to do things at the right pace.

Overall, I rate the solution an eight out of ten.

View full review »
JA
System Administrator at MOI

The solution's enterprise features align precisely with our organizational focus. I advise others to evaluate it and compare, considering the variations in each environment.

Overall, I rate it seven out of ten.

View full review »
CD
Security Solutions Architect at a tech services company with 10,001+ employees

It is mainly deployed on-prem. About 95% of the sales that I do are on-prem solutions. That's because we're talking about security.

It is a good technology. I would definitely recommend this solution. I would never sell it if I can't recommend it. I would give it an eight out of 10.

View full review »
OB
Windows Enterprise Engineer at a comms service provider with 1,001-5,000 employees

We are a customer and an end-user.

I'm not sure which version of the solution we're on right now. I cannot speak to the exact version number we are using.

I would definitely recommend the product to other companies and users. For us, it's a very important organizational tool.

Overall, I would rate it at an eight out of ten. We're mostly quite satisfied with its capabilities.

View full review »
Akash Jogbond - PeerSpot reviewer
Team Lead at Foresight Software Solutions

We are a partner and we sell and support this EPM solution to other customers.

We use both cloud and on-premises deployment options. 

I'd suggest new users go slow. Instead of going bold. It's a powerful solution. If I create a beautiful policy, the product will behave beautifully. However, if I create an ugly policy, the product will show its ugly face to you, as it's just a brainless bull running around. You have to give it a direction. Otherwise, it can harm you. 

Overall, I would rate the solution an eight out of ten.

View full review »
it_user599004 - PeerSpot reviewer
Sr Platform Engineer at a construction company with 10,001+ employees

Make use of Polmon and Beyondtrust reporting console to create the elevation rules.

View full review »
PO
Relationship Manager at Snapnet Ltd

I rate the solution a seven out of ten. 

View full review »
FA
Security Engineer at Dig8Labs

I would rate BeyondTrust at eight out of 10. It's not a 10 because the scalability and licensing have impacted us a lot. Of the two points that I have deducted: One is the non-flexibility on the pricing and one is the licensing model. When you launch a product in several markets like the European market, the Asian market, or the Russian market, you have to be very flexible when it comes to the pricing.

View full review »
GJ
PAM Architect at a tech services company with 11-50 employees

I would rate BeyondTrust Endpoint Privilege Management a nine out of ten. 

View full review »
BS
Security Staff Engineer at a tech vendor with 1,001-5,000 employees

Implementation is simple, but privileged application support may need a lot of testing. Support may not be able to help due to a lack of understanding of your environment.

View full review »
AI
Technical Manager at Gulf IT

Don't start the implementation until you get the prerequisite sheet confirmed from the customer. If not, you may waste a lot of time at the customer's site.

I have learned a couple of things from this product. First, if the organization doesn't have a structured hierarchy of the work or the segregation of duties properly implemented, no matter what kind of security there is, it tends to fail. Operationally, it tends to fail. The tasks never get finished. BeyondTrust helps define those duties properly.

That was one major thing. The other thing I learned is that PAM is not for an inexperienced person. Don't give a PAM solution to a company that is employing inexperienced people, because they will never understand the concept of security and why identity security is important.

I would rate this solution as eight and a half or nine out of ten. I am not saying ten, only because of the limited choice of Windows. If it had alternate options available, I would give it a ten.

View full review »
it_user349911 - PeerSpot reviewer
Information Security & PreSales Officer at a tech services company with 51-200 employees

Security, as always, should be taken care of in a layered approach. BeyondTrust products take care of the containment of the breach with its PAM suite of solutions, as well as reducing the attack surface with its Vulnerability Management products. Together, they present a very strong, in-depth defense approach for customers. It's not an endpoint protection product, though they have their endpoint agents, which could be installed on the workstations. It has to be implemented in conjunction with other security solutions such as endpoint protection and gateway security solutions such as email & web, as well as firewalls, IDS, IPS and other network security devices.

View full review »
it_user687237 - PeerSpot reviewer
Identity and Governance Access Lead
LN
General Manager, Head of Information Security at a tech services company with 51-200 employees

Overall, I'd rate the solution five out of ten.

I would definitely recommend it, however, I would recommend organizations test a couple of solutions based on their requirements. There will be a different requirement for a retail outlet and a different requirement for an oil and gas company. 

Even though it is privileged remote access, different accesses most likely need to be granted. If somebody is a software developer, and somebody is just for support, they will need different types of access. Whether this solution offers that a company needs depends on different requirements from different end-users.

View full review »
GK
VP Cyber Risk at a tech services company with 501-1,000 employees

Approach it slowly. Don't rush in and drop things down there. Do it carefully, because you might end up breaking access to systems, which is complicated when you're running a production environment. Make sure you go through the testing process vigorously before you deploy.

I would give BeyondTrust a seven out of ten. There are some features in CyberArk that are better, cheaper, or easier to implement. Some of those running in CyberArk don't have the conflicts that BeyondTrust has, as there are many products in the suite. You've got to compare apples with apples.

View full review »
OS
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees

This is a good solution that I would recommend, but in the Nigerian market, the price of this solution is challenging. Many companies are choosing competing solutions like CyberArk because the cost is lower. If the price were more friendly then it would have a better share of the market.

I would rate this solution an eight out of ten.

View full review »
OS
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees

We're a BeyondTrust reseller.

I'd recommend the solution. However, the pricing is not competitive and I find in the Nigerian market we're losing ground to CyberArk because the pricing is so unfriendly for the region. They need to try and match their competitors here in order to stay competitive overall in the market.

I'd rate the solution eight out of ten.

View full review »
ST
Senior Technical Consultant at a tech services company with 1,001-5,000 employees

Take care regarding the SQL database.

View full review »
AB
Consultant- Information Security at a tech services company with 11-50 employees

This program has a good reputation in the market and it is more required for the security of your infrastructure. It is a product that you can trust. The only thing I'm looking for in the next version is that the bug fixes have to be more frequent and the solution has to be more reliable and more flexible. On a scale from one to 10, I'll give it a six.

View full review »
ST
Senior Technical Consultant at a tech services company with 1,001-5,000 employees

For a Windows/Linux/Unix mixed environment, it is a good product to management privilege account passwords to prevent security breaches.

View full review »
Buyer's Guide
BeyondTrust Endpoint Privilege Management
March 2024
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.