Most Helpful Review
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
The implementation is quite easy because the documents are always online.
The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file.
I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording.
I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products.
It scales easily and the product is stable.
Reduces major vulnerabilities by removing local administrator privileges.
It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know.
Monitoring and recording are valuable features, particularly the recording.
This is the number one product for privilege account security.
The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features.
The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers.
It should support XWindows Remote Desktop Access protocol for Linux/Unix.
It only has limited support for Mac.
We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can.
I'd like to see the product include out of the box connectors.
For an experienced system implementer it will take approximately one day. However, for somebody who is inexperienced it may take up to five days.
Pricing and Cost Advice
What BeyondTrust was providing was user-based licensing which was a great benefit from the client point of view. Recently, I don't know why, the licensing model has been changed, and that is the reason that they have lost a bit of their edge when it comes to the PAM, against our competition. The asset-based licensing, from the user's point of view, is not beneficial. The licensing should be based on the users. The greater the number of users, the greater will be the load and the greater the scalability problems. I presume that is why the licensing model has changed.
PowerBroker for a Mac client is three times the price of the Windows version.
licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record.
out of 24 in Privileged Access Management
Average Words per Review
out of 58 in Endpoint Protection (EPP) for Business
Average Words per Review
Compared 54% of the time.
Compared 11% of the time.
Compared 6% of the time.
Compared 20% of the time.
Compared 15% of the time.
Compared 13% of the time.
Also Known As
|BeyondTrust PowerBroker, PowerBroker||Viewfinity|
The BeyondTrust PowerBroker Privileged Access Management Platform is an integrated solution that provides visibility and control over all privileged accounts and users. By uniting capabilities that many alternative providers offer as disjointed tools, the platform simplifies deployments, reduces costs, improves system security, and reduces privilege risks.
CyberArk Endpoint Privilege Manager enables organizations to enforce least privilege policies for business and administrative users, as well as control applications to reduce the attack surface without halting productivity. The solution helps organizations revoke everyday local administrator privileges from business users while seamlessly elevating privileges when required by trusted applications. CyberArk Endpoint Privilege Manager also enables security teams to enforce granular least privilege policies for IT administrators, helping organizations effectively segregate duties on Windows servers. Complementing these privilege controls, the solution also delivers application controls, which are designed to manage and control which applications are permitted to run on endpoints and servers and prevent malicious applications from penetrating the environment.
Learn more about BeyondTrust Endpoint Privilege Management
Learn more about CyberArk Endpoint Privilege Manager
|Aera Energy LLC, Care New England, James Madison University||Clearstream, McKesson, Boston Childrens Hospital|
Software R&D Company37%
Comms Service Provider21%
Financial Services Firm9%
No Data Available