BeyondTrust PowerBroker Reviews

4.3 out of 5 stars
 (3)
B6c426b2 be87 49c4 ba43 c406eaebb5d4 avatar?1449121566
Reseller
Information Security & PreSales Officer at a tech services company with 51-200 employees
Aug 30 2016

What is most valuable?

The main areas of focus of BeyondTrust products is Privileged Access Management. Along with it, they've also bundled the PAM solutions with a Vulnerability Management solution. We all know Retina Network Security Scanner has been around for... more»

How has it helped my organization?

We implemented the BeyondTrust suite of products as part of our initial evaluation and continued to use the product because we liked it very much. We distribute security solutions to our customers, so we can only sell something to our... more»

What needs improvement?

I'm of the thought that the best products in the market have room for improvement, always, and so is the case with this product as well. I have always submitted the improvements / bugs list to the vendor and am looking forward for them to be... more»
5bc813bf 1c36 4dab bfac 4b0a7acfcf8e avatar
Real User
Sr Platform Engineer at a construction company with 1,001-5,000 employees
Jan 31 2017

What is most valuable?

It elevates the user to perform admin tasks without the user being a part of an administrator group. PowerBroker allows elevation of required actions or application and eliminates the need of user having full administrative access. There are... more»

How has it helped my organization?

Previously, all users were in the administrator group of their machines. Since PowerBroker elevates the user, we can remove the users from the administrator group. Thus, the machines become less vulnerable to attacks

What needs improvement?

Improve the ActiveX rule for websites.
Identity and access management %28iam%29 report from it central station 2018 03 31 thumbnail
Find out what your peers are saying about BeyondTrust, CyberArk, Centrify and others in Identity and Access Management (IAM).
265,519 professionals have used our research since 2012.
Anonymous avatar x80
Real User
Identity and Governance Access Lead at a transportation company
Jul 11 2017

What do you think of BeyondTrust PowerBroker?

Valuable Features The features related to application elevate is amazing. It helped the company to remove almost all admin local users. • Improvements to My Organization There are severals application that all users needed to have local admin configured to work. After the powerbroker implementation, all users with this privilege were removed, it improved the security and helped to change the IT vision, from Security to SAFETY. • Room for Improvement Reports to the end user. • Use of Solution 1 year • Deployment Issues Not at all. • Stability Issues Not at all • Scalability Issues No. • Customer Service and Technical Support Customer Service: Very good. Technical Support: Very good • Previous Solutions No. • Initial Setup Easy. •...

Articles

User Assessments By Topic About BeyondTrust PowerBroker

Identity and access management %28iam%29 report from it central station 2018 03 31 thumbnail
Find out what your peers are saying about BeyondTrust, CyberArk, Centrify and others in Identity and Access Management (IAM).
265,519 professionals have used our research since 2012.

BeyondTrust PowerBroker Questions

BeyondTrust PowerBroker Projects By Members

BeyondTrust PowerBroker Consultants

What is BeyondTrust PowerBroker?

The BeyondTrust PowerBroker Privileged Access Management Platform is an integrated solution that provides visibility and control over all privileged accounts and users. By uniting capabilities that many alternative providers offer as disjointed tools, the platform simplifies deployments, reduces costs, improves system security, and reduces privilege risks.

BeyondTrust PowerBroker customers

Aera Energy LLC, Care New England, James Madison University

Vendor 29383 screenshot 1523727984
BUYER'S GUIDE
Not sure which Identity and Access Management (IAM) solution is right for you?

Download our free Identity and Access Management (IAM) Report and find out what your peers are saying about BeyondTrust, CyberArk, Centrify, and more!
Identity and access management %28iam%29 report from it central station 2018 03 31 thumbnail

Sign Up with Email