BeyondTrust Endpoint Privilege Management Pros and Cons

BeyondTrust Endpoint Privilege Management Pros

GJ
reviewer1324719
PAM Architect at a tech services company with 11-50 employees
What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy.
View full review »
AslamImroze
Technical Manager at Gulf IT
I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording.
View full review »
LN
reviewer1448772
General Manager, Head of Information Security at a tech services company with 51-200 employees
BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc.
View full review »
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: May 2021.
501,151 professionals have used our research since 2012.
AB
reviewer1136769
Consultant- Information Security at a tech services company with 11-50 employees
The implementation is quite easy because the documents are always online.
View full review »
OS
reviewer1093563
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager.
View full review »
GK
reviewer1241319
VP Cyber Risk at a tech services company with 501-1,000 employees
The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file.
View full review »
OS
reviewer1093563
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager.
View full review »

BeyondTrust Endpoint Privilege Management Cons

GJ
reviewer1324719
PAM Architect at a tech services company with 11-50 employees
What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way.
View full review »
AslamImroze
Technical Manager at Gulf IT
The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers.
View full review »
LN
reviewer1448772
General Manager, Head of Information Security at a tech services company with 51-200 employees
Their technical support could be more responsive and helpful.
View full review »
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: May 2021.
501,151 professionals have used our research since 2012.
AB
reviewer1136769
Consultant- Information Security at a tech services company with 11-50 employees
The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features.
View full review »
OS
reviewer1093563
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does.
View full review »
OS
reviewer1093563
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process.
View full review »
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: May 2021.
501,151 professionals have used our research since 2012.