We performed a comparison between BeyondTrust Endpoint Privilege Management and Trend Micro Apex One based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"Reduces major vulnerabilities by removing local administrator privileges."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording."
"The implementation is quite easy because the documents are always online."
"It is very precise and allows more permission for different use cases."
"The most valuable feature is that it's normal, and not for a specific server."
"It has the ability to share, which is not available in other products."
"Many features that this solution has, competitors lack. The feature I think is quite good is data loss prevention."
"DLP is a solid feature in the product. I like it very much. It is very useful in our environment. It is also a very stable solution. Their support is also very good."
"I like Apex Central. We can manage all the Trend Micro products from one console."
"The most valuable feature of Trend Micro Apex One is the response time and detection module."
"The product offers almost all of the features the client expects from such a solution."
"It only has limited support for Mac."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"Reports to the end user."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment."
"They need to come up with better integrative options which should be customer-centric."
"We do not have much control as we have to work with regional policies and regional support."
"There is room for improvement in the behavior filtering and control of Trend Micro."
"Trend Micro's encryption is not up to the mark. We tried their encryption product, but we did not like it. Encryption was difficult to manage."
"We cover many things, but there is something called ATP, advanced threat prevention. I think they need to invest in this technology."
"The Apex One endpoint sensor has room for improvement."
"The cost could be improved."
"Sometimes HTTPS sites are not blocked properly."
"They could improve the integration with Active Directory."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Trend Micro Apex One is ranked 6th in Endpoint Protection Platform (EPP) with 124 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Trend Micro Apex One is rated 8.2. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Trend Micro Apex One writes "Good monitoring and server protection with helpful machine learning". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Trend Micro Apex One is most compared with Trend Micro Deep Security, Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, Trend Micro Smart Protection and CrowdStrike Falcon.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.