We just raised a $30M Series A: Read our story

Compare BeyondTrust Endpoint Privilege Management vs. CyberArk Endpoint Privilege Manager

Cancel
You must select at least 2 products to compare!
Featured Review
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management (PAM). Updated: October 2021.
552,305 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The implementation is quite easy because the documents are always online.""Technical support is good.""BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc.""The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager.""The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file.""It is straightforward. It is a good technology, and it is made to do one single thing.""The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager.""What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."

More BeyondTrust Endpoint Privilege Management Pros »

"The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is.""It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know.""I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them.""The department management aspect of the solution is the most valuable aspect."

More CyberArk Endpoint Privilege Manager Pros »

Cons
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process.""If you don't get the implementation right at the outset, you will struggle with the product.""What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way.""They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment.""The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features.""Their technical support could be more responsive and helpful.""The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does."

More BeyondTrust Endpoint Privilege Management Cons »

"It's an old product and has many areas that can be improved.""We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can.""Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources.""Technical support is slow to respond when we run into issues."

More CyberArk Endpoint Privilege Manager Cons »

Pricing and Cost Advice
"This solution is expensive compared to its competitors.""Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."

More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice »

"Pricing depends on how many devices you use. Right now, on-premise, it costs us a little, but it's worth it. It seems like the cloud solution is much more expensive. We got this solution one year ago, and it's like we bought the solution, and now they are not going to support it on-premise anymore. We are in the implementation phase, and we missed this, and we already paid for the licenses. This is wasted time from my perspective, and CyberArk should be more customer-friendly.""I think that it was in the range of $200,000 that had to get approved."

More CyberArk Endpoint Privilege Manager Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
552,305 professionals have used our research since 2012.
Questions from the Community
Top Answer: This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpoint… more »
Top Answer: It is straightforward. It is a good technology, and it is made to do one single thing.
Top Answer: Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly… more »
Top Answer: The department management aspect of the solution is the most valuable aspect.
Top Answer: I'm more on the technical side. I don't typically deal with the pricing of products. I can't speak to the licensing, how it works, or how much it costs. That's handled by a different team.
Top Answer: Technical support is slow to respond when we run into issues. We haven't really faced too many issues so far. There are some small issues here and there, however, it hasn't been anything major. We've… more »
Ranking
Views
8,054
Comparisons
5,503
Reviews
4
Average Words per Review
650
Rating
7.5
Views
4,364
Comparisons
2,880
Reviews
3
Average Words per Review
794
Rating
7.7
Comparisons
Also Known As
BeyondTrust PowerBroker, PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix
Viewfinity
Learn More
Overview

BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.

Key Solutions Include:

-ENTERPRISE PASSWORD SECURITY

Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.

-ENDPOINT LEAST PRIVILEGE

Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.

-SERVER PRIVILEGE MANAGEMENT

Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.

-A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS

Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.

Learn more at https://www.beyondtrust.com/privilege-management

CyberArk Endpoint Privilege Manager enables organizations to enforce least privilege policies for business and administrative users, as well as control applications to reduce the attack surface without halting productivity. The solution helps organizations revoke everyday local administrator privileges from business users while seamlessly elevating privileges when required by trusted applications. CyberArk Endpoint Privilege Manager also enables security teams to enforce granular least privilege policies for IT administrators, helping organizations effectively segregate duties on Windows servers. Complementing these privilege controls, the solution also delivers application controls, which are designed to manage and control which applications are permitted to run on endpoints and servers and prevent malicious applications from penetrating the environment.

Offer
Learn more about BeyondTrust Endpoint Privilege Management
Learn more about CyberArk Endpoint Privilege Manager
Sample Customers
Aera Energy LLC, Care New England, James Madison University
Clearstream, McKesson, Boston Childrens Hospital
Top Industries
VISITORS READING REVIEWS
Computer Software Company27%
Comms Service Provider19%
Financial Services Firm7%
Government5%
VISITORS READING REVIEWS
Computer Software Company27%
Comms Service Provider12%
Financial Services Firm9%
Insurance Company7%
Company Size
REVIEWERS
Small Business56%
Midsize Enterprise6%
Large Enterprise38%
REVIEWERS
Small Business45%
Midsize Enterprise9%
Large Enterprise45%
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management (PAM). Updated: October 2021.
552,305 professionals have used our research since 2012.

BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 8 reviews while CyberArk Endpoint Privilege Manager is ranked 28th in Endpoint Protection for Business (EPP) with 4 reviews. BeyondTrust Endpoint Privilege Management is rated 7.6, while CyberArk Endpoint Privilege Manager is rated 7.6. The top reviewer of BeyondTrust Endpoint Privilege Management writes "A stable, scalable, and easy-to-deploy solution that can track malicious use or send analytics to a host". On the other hand, the top reviewer of CyberArk Endpoint Privilege Manager writes "Enables us to see how users use their access and lock down things that aren't appropriate". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Privileged Access Manager, Thycotic Secret Server, Cisco ISE (Identity Services Engine), ARCON Privileged Access Management and One Identity Manager, whereas CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Carbon Black CB Defense, Tanium and McAfee Endpoint Security.

We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.