We performed a comparison between BeyondTrust Endpoint Privilege Management and Cisco ISE (Identity Services Engine) based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."It scales easily and the product is stable."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"Reduces major vulnerabilities by removing local administrator privileges."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"Scalability is good. I would rate the scalability a nine out of ten."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
"The solution cuts down on the repercussions of getting malware or ransomware."
"The solution is great for establishing trust for every access request no matter where it comes from."
"The core point is that Cisco ISE is the same globally compared to FortiAuthenticator. Whether I deploy in China, the US, South Africa, or wherever, I'm can get all the capabilities. It allows me to directly integrate with 365, and from a communications point of view, that is a good capability."
"The most valuable feature is the ASDM - the user interface makes it very easy to configure the firewall."
"The WiFi portal in Cisco ISE is very useful for WiFi customers."
"It has allowed us to pull in multiple authentication databases, then centralize them into a captive portal system."
"They have recently made a lot of improvements. My clients don't have much to complain about."
"The posture assessment is a valuable feature because of the ability to do assessments on the clients before they connect to the network."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment."
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"The product should improve its price."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"It only has limited support for Mac."
"They need to come up with better integrative options which should be customer-centric."
"The compliance and posture don't always work. They should make it more stable. With each upgrade, we lose some functionality. We have to wait for another upgrade."
"The price could be better. I would like to see more integration with third-party solutions in the next release. This is because many of my clients don't have Cisco."
"I would definitely improve the deployment and maybe a little bit of the support. Our first exposure to ISE had a lot of issues."
"If Cisco could grant more control, the features could be more focused on network and security administration, reducing the need for integration with other components."
"It does a good job of establishing trust for every access request. We have had a little bit of a challenge with profiling, but we are probably about 80% there."
"I would like to see the product simplified more, especially with the configuration."
"There can be a little bit more integration between the controller management and ISE. There are two dashboards, you have the controller dashboards, and you have the ISE dashboard it would is a way to maybe integrate that into one. That would be great. It's not that bad. It would be easier if it could be combined into one dashboard."
"The intuitiveness of the user interface could be improved."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
More Cisco ISE (Identity Services Engine) Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Cisco ISE (Identity Services Engine) is ranked 1st in Network Access Control (NAC) with 135 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Cisco ISE (Identity Services Engine) is rated 8.2. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Cisco ISE (Identity Services Engine) writes "Gives us that extra ability to assist the end user and make sure that we are making them happy". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, CyberArk Privileged Access Manager, Delinea Secret Server, ARCON Privileged Access Management and Microsoft Defender for Endpoint, whereas Cisco ISE (Identity Services Engine) is most compared with Aruba ClearPass, Fortinet FortiNAC, Forescout Platform, CyberArk Privileged Access Manager and Portnox CORE.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.