We performed a comparison between BeyondTrust Endpoint Privilege Management and CrowdStrike Falcon based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."Reduces major vulnerabilities by removing local administrator privileges."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"The implementation is quite easy because the documents are always online."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"It scales easily and the product is stable."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"From what we have seen, it is very scalable. We have recently acquired a company where someone had a ransomware attack when we joined networks. Within the course of just a few days, we were able to easily get CrowdStrike rolled out to about 300 machines. That also included the removal of that company's legacy anti-malware tool."
"It has definitely minimized resources. When everything was on-prem, there was a lot more work maintaining it. One of the big value tickets: I don't have lists of hundreds of exceptions for certain applications that I have to maintain, add, delete, and move. The very nature of the product has lessened my workload considerably."
"CrowdStrike Falcon is effortless to use, and it's a cloud-specific platform. You only need to deploy the light agents on the licensed endpoints, and you're ready to work. Your dashboards will tell you the number of the endpoints being protected and the incidents. There are also incident dashboards with alerts that will tell you about the details."
"The automatic alert feature is the most important feature of the solution."
"Everything we've done with CrowdStrike is due to Arctic Wolf. We don't even need to get alerts from CrowdStrike anymore. It'll send those to Arctic Wolf, and then Arctic Wolf analyzes those and let us know if there's a major issue."
"The most valuable feature is the indicator of compromise, which show you what file was either quarantined or removed."
"It's very easy to set up."
"The features we showcase to potential customers are prevention, malware protection, zero-day protection, and application scripting. Vulnerability assessment is another valuable feature."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"Reports to the end user."
"They need to come up with better integrative options which should be customer-centric."
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"The product should improve its price."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"I have worked with their technical support on several problems that were never fully resolved."
"It would be nice if the dashboard had some more information upfront, and looked a little better."
"Falcon could include more integrative features."
"This solution is relatively expensive."
"CrowdStrike needs to quit making up stuff about its features and functionality to bash its competition."
"We'd like to see more integration capabilities."
"They should provide us with good visibility for everything."
"There is room for improvement in managing multiple customer IDs."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while CrowdStrike Falcon is ranked 3rd in Endpoint Detection and Response (EDR) with 104 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while CrowdStrike Falcon is rated 8.6. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of CrowdStrike Falcon writes "Easy to set up with good behavior-based analysis but needs a single-click recovery option". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and Saviynt, whereas CrowdStrike Falcon is most compared with Microsoft Defender XDR, Darktrace, Microsoft Defender for Endpoint, Trend Micro Deep Security and SentinelOne Singularity Complete.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.