BeyondTrust Endpoint Privilege Management Valuable Features

GJ
reviewer1324719
PAM Architect at a tech services company with 11-50 employees

What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. 

It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy.

View full review »
AslamImroze
Technical Manager at Gulf IT

I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things that the customers are worried about when they talk about session recording.

The other valuable feature is out-of-box connectors. BeyondTrust has partnered with many well-known companies. Other PAM products are not there yet. The number of out-of-box connectors BeyondTrust has is really good.

View full review »
LN
reviewer1448772
General Manager, Head of Information Security at a tech services company with 51-200 employees

The solution is very fast.

The solution offers good authentification. It makes managing passwords and access easy and ensures that access is granted only to respective people and/or organizations.

BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc.

View full review »
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: June 2021.
509,820 professionals have used our research since 2012.
OS
reviewer1093563
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees

The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager.

View full review »
GK
reviewer1241319
VP Cyber Risk at a tech services company with 501-1,000 employees

The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file.

View full review »
OS
reviewer1093563
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees

The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager.

View full review »
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: June 2021.
509,820 professionals have used our research since 2012.