We performed a comparison between BeyondTrust Endpoint Privilege Management and CylancePROTECT based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The solution's technical support is good."
"Scalability is good. I would rate the scalability a nine out of ten."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"The tool is easy to use and deploy. It has PAM capabilities like privilege access. The solution helps with the management of third parties and vendors. It is an effective solution compared to other alternatives."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"Technical support is good."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"What I like best about CylancePROTECT is its accuracy, as it doesn't give many false positives."
"The solution is stable."
"I rate the tool a ten out of ten when it comes to the ease of use or management part."
"The solution’s AI is its most valuable feature."
"The initial setup of CylancePROTECT is very easy."
"The non-daily requirement to update signatures is the most valuable feature. From a functional point of view, it is pretty spot on. For instance, we compared an algorithm from five years ago to today's algorithm, and it was 98% accurate. It has the ability to detect and mitigate. In the industrial environment that we work in, there's what we call OT versus IT. You are IT Central, but this is OT. Generally, we don't have the same level of skillset as IT individuals or IT professionals have. This particular product doesn't require you to be a computer scientist to be able to understand its proprietary algorithm and to be able to deploy, use, and work within it. It integrates well with a robust SIEM or SOAR solution, and it plays nice with others. We use other detection solutions like CyberX or site provision with Cisco, and it plays nice. That's one of the things we really liked about it."
"You can manage all the threats and everything from a centralized dashboard."
"It actively monitors the behavior and activity of processes and will, without hesitation, terminate at root anything it determines to be suspect."
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
"How the accounts are presented in the solution's UI can be improved."
"Their technical support could be more responsive and helpful."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"Its feature for establishing workflows needs improvement."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"The product should improve its price."
"It's a good solution but some features just need to be updated."
"Work on the math model. We are catching a lot of false positives, which gets to be a pain at the start of a deployment."
"It should have better support for Windows and Mac."
"rom my experience interacting with the primary or the central administrative console, it's quite complex. You would need a fair bit of technical experience to set it up, implement and maintain it. That would be one area for improvement."
"I would say one thing that they might need to bring in is protection for mobile devices."
"The solution’s technical support could be improved."
"The solution needs better dashboards that are easier to use."
"I would like to see them fix the alerting system so that the endpoint reporting is a bit more streamlined."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while CylancePROTECT is ranked 27th in Endpoint Protection Platform (EPP) with 39 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while CylancePROTECT is rated 8.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of CylancePROTECT writes "Ensures advanced AI-driven threat detection to provide robust endpoint security, effectively preventing both known and unknown threats with minimal impact on system performance". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas CylancePROTECT is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, SentinelOne Singularity Complete, Cortex XDR by Palo Alto Networks and Trend Micro Deep Security.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.