BeyondTrust Endpoint Privilege Management Reviews

Filter by:Reset all filters
industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
rating
Loading...
Filter Unavailable
AslamImroze
Reseller
Technical Manager at Gulf IT
Nov 08 2019

What is most valuable?

I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things that the customers are worried about when they talk… more»

What needs improvement?

One issue, especially when you deploy HA actively and passively, is the synchronization. Usually, there is a large delay between the sync. The biggest problem is that it takes at least 14 minutes to detect that the primary is down. That is 14 minutes of downtime, which is a huge amount of time… more»

What other advice do I have?

Don't start the implementation until you get the prerequisite sheet confirmed from the customer. If not, you may waste a lot of time at the customer's site. I have learned a couple of things from this product. First, if the organization doesn't have a structured hierarchy of the work or the… more»

Which other solutions did I evaluate?

I've actually looked at ARCON and BeyondTrust. Now I'm working with BeyondTrust implementation. Features-wise, BeyondTrust is a lot better than ARCON. ARCON, even with limited features, is still good, but the number of features and scope of its privilege control is limited. BeyondTrust Password Safe… more»
Faraz Abbasi
Real User
Security Engineer at Dig8Labs
Aug 20 2018

What is most valuable?

I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic -… more»

What needs improvement?

If you are specifically dedicated to Privileged Access Management, the definitions are a bit unclear throughout the world. I have been in contact with engineers around the world, in Canada, the U.S… more»

What's my experience with pricing, setup cost, and licensing?

What BeyondTrust was providing was user-based licensing which was a great benefit from the client point of view. Recently, I don't know why, the licensing model has been changed, and that is the… more»

Which solution did I use previously and why did I switch?

I have utilized OpenAM SSO, as a single sign-on. That was a Canadian product. It was an open-source solution. But I am happier with BeyondTrust. About 95 percent of use cases are handled by… more»

What other advice do I have?

I would rate BeyondTrust at eight out of 10. It's not a 10 because the scalability and licensing have impacted us a lot. Of the two points that I have deducted: One is the non-flexibility on the… more»

Which other solutions did I evaluate?

My company first chose the IBM Identity Manager suite. Later on, we surveyed the market and the needs and requirements of the clients. We thought the IBM solution was utilizing too many resources to… more»
Find out what your peers are saying about BeyondTrust, CyberArk, Thycotic and others in Privileged Access Management. Updated: January 2020.
391,932 professionals have used our research since 2012.
Consultant
Consultant- Information Security at a tech services company with 11-50 employees
Jan 16 2020

What needs improvement?

There are a few points that are lagging in the technology and I think updated versions should be available more frequently. So the program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features.

What other advice do I have?

This program has a good reputation in the market and it is more required for the security of your infrastructure. It is a product that you can trust. The only thing I'm looking for in the next version is that the bug fixes have to be more frequent and the solution has to be more reliable and more flexible. On a scale from one to 10, I'll give it a six.
Real User
VP Cyber Risk at a tech services company with 501-1,000 employees
Dec 05 2019

What is most valuable?

The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file.

What needs improvement?

This depends on the client. Some clients find the granular approach a lot better than the simplified approach and some clients prefer the simplified approach better than the granular approach. Depending on the type of organization and type of information that must be protected, there are obviously different requirements.

What other advice do I have?

Approach it slowly. Don't rush in and drop things down there. Do it carefully, because you might end up breaking access to systems, which is complicated when you're running a production environment. Make sure you go through the testing process vigorously before you deploy. I would give BeyondTrust a seven out of ten. There are some features in CyberArk that are better, cheaper, or easier to… more»
Real User
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
Jan 28 2020

What is most valuable?

The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager.

What needs improvement?

The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and… more»

What's my experience with pricing, setup cost, and licensing?

The pricing is quite high.

Which solution did I use previously and why did I switch?

We didn't previously use a different solution.

What other advice do I have?

We're a BeyondTrust reseller. I'd recommend the solution. However, the pricing is not competitive and I find in the Nigerian market we're losing ground to CyberArk because the pricing is so unfriendly… more»

Which other solutions did I evaluate?

We didn't evaluate other options. We were already using BeyondTrust and it seemed a natural extension to add this solution as well.
Sec7439EngR
Real User
Security Staff Engineer at a tech vendor with 1,001-5,000 employees
Jul 16 2018

What do you think of BeyondTrust Endpoint Privilege Management?

What is our primary use case?

We use it to limit user privileges.

How has it helped my organization?

It reduces major vulnerabilities by removing local administrator privileges.

What is most valuable?

I like that I can remove local admin privileges from developers.

What needs improvement?

It only has limited support for Mac.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

In version 7.3 there were driver compatibility issues with other security applications, but they were resolved very quickly by support.

What do I think about the scalability of the solution?

The BeyondInsight appliance environment is not as flexible as it should be in some designs. But overall, it’s a well-designed product.

How is

Star Tseng
Consultant
Senior Technical Consultant at a tech services company with 1,001-5,000 employees
Aug 14 2018

What do you think of BeyondTrust Endpoint Privilege Management?

What is our primary use case?

We use it for the password management (of privileged password management).

What is most valuable?

Privileged password management.

What needs improvement?

It should support XWindows Remote Desktop Access Protocol for Linux/Unix. I would like more connectors for other security software/systems. A password is needed to access their security systems.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

No stability issues.

What do I think about the scalability of the solution?

It scales easily.

How are customer service and technical support?

I would rate their technical support as a nine out of 10. I have a technical support contact in Singapore.

Which solution did I use

StarTseng
Consultant
Senior Technical Consultant at a tech services company with 1,001-5,000 employees
Jul 16 2018

What do you think of BeyondTrust Endpoint Privilege Management?

How has it helped my organization?

Simplifies server access without password distribution.

What is most valuable?

Password management, as it is a core function; passwords are a frequent hacking point.

What needs improvement?

All products have room to improve. I would like to see support for many more systems, such as AS400.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

No issues with stability.

What do I think about the scalability of the solution?

I have not had a chance to scale out.

How is customer service and technical support?

My support has come from the sales engineering team, not the support team, and I would rate the support at nine out of 10.

How was the initial setup?

For a production…

Articles

User Assessments By Topic About BeyondTrust Endpoint Privilege Management

Find out what your peers are saying about BeyondTrust, CyberArk, Thycotic and others in Privileged Access Management. Updated: January 2020.
391,932 professionals have used our research since 2012.

BeyondTrust Endpoint Privilege Management Questions

What is BeyondTrust Endpoint Privilege Management?

The BeyondTrust PowerBroker Privileged Access Management Platform is an integrated solution that provides visibility and control over all privileged accounts and users. By uniting capabilities that many alternative providers offer as disjointed tools, the platform simplifies deployments, reduces costs, improves system security, and reduces privilege risks.

Also known as
BeyondTrust PowerBroker, PowerBroker
BeyondTrust Endpoint Privilege Management customers

Aera Energy LLC, Care New England, James Madison University

BUYER'S GUIDE
Download our free Privileged Access Management Report and find out what your peers are saying about BeyondTrust, CyberArk, Thycotic, and more!