BeyondTrust Endpoint Privilege Management Reviews

BeyondTrust Endpoint Privilege Management is the #4 ranked solution of our top Privileged Access Management tools. It's rated 3.3 out of 5 stars, and is most commonly compared to CyberArk PAS - BeyondTrust Endpoint Privilege Management vs CyberArk PAS

Filter by:
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
AslamImroze
Reseller
Technical Manager at Gulf IT
Nov 08 2019

What is most valuable?

I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things that the customers are worried about when they talk… more »

What needs improvement?

One issue, especially when you deploy HA actively and passively, is the synchronization. Usually, there is a large delay between the sync. The biggest problem is that it takes at least 14 minutes to detect that the primary is down. That is 14 minutes of downtime, which is a huge amount of time… more »

What other advice do I have?

Don't start the implementation until you get the prerequisite sheet confirmed from the customer. If not, you may waste a lot of time at the customer's site. I have learned a couple of things from this product. First, if the organization doesn't have a structured hierarchy of the work or the… more »

Which other solutions did I evaluate?

I've actually looked at ARCON and BeyondTrust. Now I'm working with BeyondTrust implementation. Features-wise, BeyondTrust is a lot better than ARCON. ARCON, even with limited features, is still good, but the number of features and scope of its privilege control is limited. BeyondTrust Password Safe… more »
Consultant
Consultant- Information Security at a tech services company with 11-50 employees
Jan 16 2020

What needs improvement?

There are a few points that are lagging in the technology and I think updated versions should be available more frequently. So the program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features.

What other advice do I have?

This program has a good reputation in the market and it is more required for the security of your infrastructure. It is a product that you can trust. The only thing I'm looking for in the next version is that the bug fixes have to be more frequent and the solution has to be more reliable and more flexible. On a scale from one to 10, I'll give it a six.
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
439,184 professionals have used our research since 2012.
Reseller
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
Feb 26 2020

What is most valuable?

The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager.

What needs improvement?

The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does. This would help because sometimes, you can get lost and you find yourself going back to… more »

What's my experience with pricing, setup cost, and licensing?

This solution is expensive compared to its competitors.

Which solution did I use previously and why did I switch?

We offer a variety of competing solutions to our clients, such as CyberArk. In general, the competitors are cheaper in price. I have not personally used other solutions because it was BeyondTrust that brought me into the privileged access… more »

What other advice do I have?

This is a good solution that I would recommend, but in the Nigerian market, the price of this solution is challenging. Many companies are choosing competing solutions like CyberArk because the cost is lower. If the price were more friendly… more »
Real User
VP Cyber Risk at a tech services company with 501-1,000 employees
Dec 05 2019

What is most valuable?

The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file.

What needs improvement?

This depends on the client. Some clients find the granular approach a lot better than the simplified approach and some clients prefer the simplified approach better than the granular approach. Depending on the type of organization and type of information that must be protected, there are obviously different requirements.

What other advice do I have?

Approach it slowly. Don't rush in and drop things down there. Do it carefully, because you might end up breaking access to systems, which is complicated when you're running a production environment. Make sure you go through the testing process vigorously before you deploy. I would give BeyondTrust a seven out of ten. There are some features in CyberArk that are better, cheaper, or easier to… more »
Reseller
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
Jan 28 2020

What is most valuable?

The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager.

What needs improvement?

The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and… more »

What's my experience with pricing, setup cost, and licensing?

The pricing is quite high.

Which solution did I use previously and why did I switch?

We didn't previously use a different solution.

What other advice do I have?

We're a BeyondTrust reseller. I'd recommend the solution. However, the pricing is not competitive and I find in the Nigerian market we're losing ground to CyberArk because the pricing is so unfriendly… more »

Which other solutions did I evaluate?

We didn't evaluate other options. We were already using BeyondTrust and it seemed a natural extension to add this solution as well.

What is BeyondTrust Endpoint Privilege Management?

BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.

Key Solutions Include:

-ENTERPRISE PASSWORD SECURITY

Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.

-ENDPOINT LEAST PRIVILEGE

Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.

-SERVER PRIVILEGE MANAGEMENT

Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.

-A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS

Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.

Learn more at https://www.beyondtrust.com/privilege-management

Also known as
BeyondTrust PowerBroker, PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix
BeyondTrust Endpoint Privilege Management customers

Aera Energy LLC, Care New England, James Madison University

Read Archived Reviews
Buyer's Guide
Download our free BeyondTrust Endpoint Privilege Management Report and get advice and tips from experienced pros sharing their opinions.