We performed a comparison between BeyondTrust Endpoint Privilege Management and CyberArk Endpoint Privilege Manager based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The tool is easy to use and deploy. It has PAM capabilities like privilege access. The solution helps with the management of third parties and vendors. It is an effective solution compared to other alternatives."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"Scalability is good. I would rate the scalability a nine out of ten."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"I find the solution’s features like section management, password management, and analytics valuable."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
"The password rotation and the session recording are the most valuable features."
"We were able to reduce the number of privileged accounts by 50%, which helped to simplify our privileged access management environment."
"The solution's technical support is good."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution."
"I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good."
"The most valuable feature is that their database is completely encrypted and protected with multiple layers."
"The solution allows me to give access and privileges to each user individually"
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"Its feature for establishing workflows needs improvement."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful."
"If you don't get the implementation right at the outset, you will struggle with the product."
"It only has limited support for Mac."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"The price of the solution should improve."
"It cannot be on-prem. It is only cloud-based. Sometimes, that's a restriction in terms of usage."
"The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate."
"For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days."
"CyberArk is a pretty heavy solution."
"It is hard to deal with technical support if you are not certified."
"The solution's pricing could be better."
"CyberArk Endpoint Privilege Manager can be better by making its UI more consistent."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 26 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while CyberArk Endpoint Privilege Manager is rated 8.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". BeyondTrust Endpoint Privilege Management is most compared with Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server, ARCON Privileged Access Management and Microsoft Defender for Endpoint, whereas CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, CyberArk Privileged Access Manager, Tanium and SentinelOne Singularity Complete. See our BeyondTrust Endpoint Privilege Management vs. CyberArk Endpoint Privilege Manager report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.