BeyondTrust Endpoint Privilege Management Pros and Cons

BeyondTrust Endpoint Privilege Management Pros

AslamImroze
Technical Manager at Gulf IT
I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording.
View full review »
Faraz Abbasi
Security Engineer at Dig8Labs
I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products.
View full review »
reviewer1136769
Consultant- Information Security at a tech services company with 11-50 employees
The implementation is quite easy because the documents are always online.
View full review »
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
419,360 professionals have used our research since 2012.
reviewer1093563
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager.
View full review »
reviewer1241319
VP Cyber Risk at a tech services company with 501-1,000 employees
The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file.
View full review »
reviewer1093563
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager.
View full review »
Sec7439EngR
Security Staff Engineer at a tech vendor with 1,001-5,000 employees
Reduces major vulnerabilities by removing local administrator privileges.
View full review »
Star Tseng
Senior Technical Consultant at a tech services company with 1,001-5,000 employees
It scales easily and the product is stable.
View full review »

BeyondTrust Endpoint Privilege Management Cons

AslamImroze
Technical Manager at Gulf IT
The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers.
View full review »
reviewer1136769
Consultant- Information Security at a tech services company with 11-50 employees
The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features.
View full review »
reviewer1093563
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does.
View full review »
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
419,360 professionals have used our research since 2012.
reviewer1093563
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process.
View full review »
Sec7439EngR
Security Staff Engineer at a tech vendor with 1,001-5,000 employees
It only has limited support for Mac.
View full review »
Star Tseng
Senior Technical Consultant at a tech services company with 1,001-5,000 employees
It should support XWindows Remote Desktop Access protocol for Linux/Unix.
View full review »
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
419,360 professionals have used our research since 2012.