We performed a comparison between BeyondTrust Endpoint Privilege Management and Sophos EPP Suite based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."It scales easily and the product is stable."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"Reduces major vulnerabilities by removing local administrator privileges."
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us."
"The solution's technical support is good."
"The product is stable and has a user-friendly dashboard. It has good security features."
"The most valuable feature is endpoint detection and response."
"The performance and scalability are impressive. We can install it on various computers."
"The solution is useful for security purposes."
"Sophos EPP Suite is a powerful antivirus."
"So easy to deploy and use that you really don't even need their technical support."
"The setup is very easy, which takes around twenty minutes to set up the cloud setup and the licensing portal."
"We bought it because it was cost-effective."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"If you don't get the implementation right at the outset, you will struggle with the product."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"How the accounts are presented in the solution's UI can be improved."
"They need to come up with better integrative options which should be customer-centric."
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"It only has limited support for Mac."
"The encryption features are not as good as McAfee's."
"We need to uninstall the license to move to another endpoint."
"I would like to have more logging features to help more deeply analyze traffic."
"The product's resource utilization is a concern, especially regarding memory usage on systems with older specifications such as lower memory and less powerful processors."
"There has been an increase of about 7-10% in recent months. That's why we face issues with customers who have been using it since 2017."
"There are also issues with the compatibility of the OS. When using Sophos with Windows and devices, most of them work well, but as soon as we work with macOS and Linux, many issues arise that we do not want to have."
"I would like to have the capability to support legacy operating systems because the majority now don't support Windows XP, and Windows 2000."
"The solution needs to perform better or update its anti-ransomware and anti-malware engines to keep up with the latest hacking techniques."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Sophos EPP Suite is ranked 26th in Endpoint Protection Platform (EPP) with 52 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Sophos EPP Suite is rated 8.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Sophos EPP Suite writes "The solution provides endpoint detection and response with a nice-looking dashboard". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Sophos EPP Suite is most compared with Trend Micro Deep Security, Seqrite Endpoint Security, Trellix Endpoint Security, SentinelOne Singularity Complete and Coro.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.