We performed a comparison between BeyondTrust Endpoint Privilege Management and VMware Carbon Black Endpoint based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"Scalability is good. I would rate the scalability a nine out of ten."
"I find the solution’s features like section management, password management, and analytics valuable."
"The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"Logs that get collected on the Privilege Management console from the agents are very good. They help us to identify the aspects from which we have to whitelist an application."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"This product has the capability of uploading scripts to the tool and this is a very comprehensive feature."
"Once the solution is installed and configured correctly it does not require a lot of hands-on attention until you need upgrading."
"It is a very complete platform."
"The most valuable asset is the time-lining capability for any breach activity."
"Carbon Black Cb Defense improved our endpoint level security. It helped to identify endpoint and infrastructure loopholes."
"The best feature of this solution is that we have a live response, which is really tailored to our needs."
"The whole purpose of the product, like application control, is very good, and also if you need to update some policies, it works well and instantly."
"One of the most valuable features is that it will block vulnerable sites. If there was a connection between one of our devices to a known malware site, it will block it."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"Reports to the end user."
"Its feature for establishing workflows needs improvement."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"They need to come up with better integrative options which should be customer-centric."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"I haven't run into anything that needs improvement. The website interface can be a little bit better, but it's still good as compared to most others."
"Sensor deployment requires extensive fine-tuning, and creating deployment packages is time-consuming."
"Right now, Carbon Black CB Defense doesn't support cloud computing and Kubernetes."
"Based on all the security roles and the release privilege, it could take time for an application to be whitelisted and approved for use."
"The node management could be much better. The one thing that they cannot do very easily is change the tenant from a backend."
"The solution has to mature on container security and a lot of cloud environment security."
"The solution would be more effective if there was a way to block automatically based on behavior."
"Needs improvement in the area of infrastructure for on-premise installation."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 27 reviews while VMware Carbon Black Endpoint is ranked 16th in Endpoint Protection Platform (EPP) with 61 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while VMware Carbon Black Endpoint is rated 8.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of VMware Carbon Black Endpoint writes "Centralization via the cloud allows us to protect and control people working from home". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas VMware Carbon Black Endpoint is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, Trend Micro Deep Security, SentinelOne Singularity Complete and Symantec Endpoint Security.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.