Compare BeyondTrust Endpoint Privilege Management vs. CyberArk Endpoint Privilege Manager

BeyondTrust Endpoint Privilege Management is ranked 3rd in Privileged Access Management with 7 reviews while CyberArk Endpoint Privilege Manager is ranked 27th in Endpoint Protection (EPP) for Business with 3 reviews. BeyondTrust Endpoint Privilege Management is rated 7.8, while CyberArk Endpoint Privilege Manager is rated 8.4. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Great session management features and out-of-box connectors". On the other hand, the top reviewer of CyberArk Endpoint Privilege Manager writes "Enables us to see how users use their access and lock down things that aren't appropriate". BeyondTrust Endpoint Privilege Management is most compared with CyberArk PAS, Thycotic Secret Server and CyberArk Endpoint Privilege Manager, whereas CyberArk Endpoint Privilege Manager is most compared with BeyondTrust Endpoint Privilege Management, CrowdStrike and Carbon Black CB Defense.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about CyberArk, ARCON, BeyondTrust and others in Privileged Access Management. Updated: January 2020.
391,045 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The implementation is quite easy because the documents are always online.The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file.I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording.I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products.It scales easily and the product is stable.Reduces major vulnerabilities by removing local administrator privileges.

Read more »

It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know.Monitoring and recording are valuable features, particularly the recording.This is the number one product for privilege account security.

Read more »

Cons
The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features.The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers.It should support XWindows Remote Desktop Access protocol for Linux/Unix.It only has limited support for Mac.

Read more »

We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can.I'd like to see the product include out of the box connectors.For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days.

Read more »

Pricing and Cost Advice
What BeyondTrust was providing was user-based licensing which was a great benefit from the client point of view. Recently, I don't know why, the licensing model has been changed, and that is the reason that they have lost a bit of their edge when it comes to the PAM, against our competition. The asset-based licensing, from the user's point of view, is not beneficial. The licensing should be based on the users. The greater the number of users, the greater will be the load and the greater the scalability problems. I presume that is why the licensing model has changed.PowerBroker for a Mac client is three times the price of the Windows version.

Read more »

licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record.

Read more »

report
Use our free recommendation engine to learn which Privileged Access Management solutions are best for your needs.
391,045 professionals have used our research since 2012.
Ranking
Views
7,405
Comparisons
3,757
Reviews
5
Average Words per Review
487
Avg. Rating
8.2
Views
1,871
Comparisons
1,160
Reviews
3
Average Words per Review
644
Avg. Rating
8.3
Top Comparisons
Also Known As
BeyondTrust PowerBroker, PowerBrokerViewfinity
Learn
BeyondTrust
CyberArk
Overview

The BeyondTrust PowerBroker Privileged Access Management Platform is an integrated solution that provides visibility and control over all privileged accounts and users. By uniting capabilities that many alternative providers offer as disjointed tools, the platform simplifies deployments, reduces costs, improves system security, and reduces privilege risks.

CyberArk Endpoint Privilege Manager enables organizations to enforce least privilege policies for business and administrative users, as well as control applications to reduce the attack surface without halting productivity. The solution helps organizations revoke everyday local administrator privileges from business users while seamlessly elevating privileges when required by trusted applications. CyberArk Endpoint Privilege Manager also enables security teams to enforce granular least privilege policies for IT administrators, helping organizations effectively segregate duties on Windows servers. Complementing these privilege controls, the solution also delivers application controls, which are designed to manage and control which applications are permitted to run on endpoints and servers and prevent malicious applications from penetrating the environment.

Offer
Learn more about BeyondTrust Endpoint Privilege Management
Learn more about CyberArk Endpoint Privilege Manager
Sample Customers
Aera Energy LLC, Care New England, James Madison UniversityClearstream, McKesson, Boston ChildrenĀs Hospital
Top Industries
VISITORS READING REVIEWS
Software R&D Company37%
Comms Service Provider21%
Financial Services Firm9%
Construction Company7%
No Data Available
Find out what your peers are saying about CyberArk, ARCON, BeyondTrust and others in Privileged Access Management. Updated: January 2020.
391,045 professionals have used our research since 2012.
We monitor all Privileged Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.