BeyondTrust Endpoint Privilege Management Valuable Features

AslamImroze
Technical Manager at Gulf IT
I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things that the customers are worried about when they talk about session recording. The other valuable feature is out-of-box connectors. BeyondTrust has partnered with many well-known companies. Other PAM products are not there yet. The number of out-of-box connectors BeyondTrust has is really good. View full review »
Faraz Abbasi
Security Engineer at Dig8Labs
I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products. It also provides a granular approach through the Management Console and manages all the operations "from the inside out". It is easy to explain and easy to manage. View full review »
reviewer1093563
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager. View full review »
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
426,947 professionals have used our research since 2012.
reviewer1241319
VP Cyber Risk at a tech services company with 501-1,000 employees
The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file. View full review »
reviewer1093563
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager. View full review »
Sec7439EngR
Security Staff Engineer at a tech vendor with 1,001-5,000 employees
I like that I can remove local admin privileges from developers. View full review »
Star Tseng
Senior Technical Consultant at a tech services company with 1,001-5,000 employees
Privileged password management. View full review »
StarTseng
Senior Technical Consultant at a tech services company with 1,001-5,000 employees
Password management, as it is a core function; passwords are a frequent hacking point. View full review »
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
426,947 professionals have used our research since 2012.