We performed a comparison between BeyondTrust Endpoint Privilege Management, CyberArk Privileged Access Manager, and Keeper based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"Reduces major vulnerabilities by removing local administrator privileges."
"The product is secure."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"CyberArk is not just an IT security or cybersecurity tool. It's also an administrator tool. I had a fair number of systems where the passwords were not fully managed by CyberArk yet, and they were expiring every 30 or 45 days. I was able to get management turned on for those accounts. From an administrator perspective, I didn't have to go back into those systems and manually change those passwords anymore. CyberArk... lightened the load on our administrative work."
"Securely protects our TAP/NUID and privileged access accounts within the company."
"The integrations are the most valuable aspect of CyberArk Privileged Access Manager. The software offers pre-built integrations, and our team can also create custom connectors. This flexibility allows us to integrate with systems that we previously didn't consider integrating with, making it a significant advantage for us."
"It is a single tool that isolates possible kinds of malware. You get lateral movement blocking and auditing information, e.g., you know who is doing what. You are getting protections from the service as well as a useful environment. All your admins can easily go in and out of your company while accessing your servers in a secure way, even if they are working abroad."
"It has the ability to scale out. We have scaled out quite a bit with our product and use of it to get to multiple locations and businesses, so it has the breadth to do that."
"You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily."
"We found the initial setup to be easy."
"The central password manager is the most valuable feature because the password is constantly changing. If an outsider threat came in and gained access to one of those passwords, they would not have access for long."
"It is nice to be able to use my Touch ID and have access to all my passwords in one place."
"I like a couple of things about this solution. Being able to share passwords with other people is valuable. You can see if the information is out on the dark web and whether you have weak passwords and the last time they were changed. You could also have the 2FA or MFA codes embedded in the application so that you don't have to use your phone or any other 2FA device, which is something very important."
"Available for Windows platforms and also Mac OS and Linux systems."
"It keeps my passwords organized and safe."
"The ability to autofill the login credentials has saved me a lot of time in my day to day computing."
"i have only one password to remember, which is the one to get me into Keeper."
"I like the tool's keyword editor and SSO."
"Keeper Bridge."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"We faced some challenges with remote desktop sessions."
"The product should improve its price."
"How the accounts are presented in the solution's UI can be improved."
"New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections."
"Performance of PIM could be better and intended for usability as well as security."
"Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"CyberArk PAM could greatly benefit from an under-the-hood update; integrating machine learning algorithms could provide predictive insights."
"It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
"It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers."
"Make it easier to deploy."
"I would like to see a way to store files and photos in the next update. If it already does this, I have yet to explore it."
"It would be nice to see this great tool integrate with other tools out there."
"The organization of items needs improvement. For example, when I log onto the cloud version as well, everything is shown on my folder. It is hard to differentiate between files and documents in my list of items I have stored inside."
"Ability to store 'files' from IOS & Android devices. You can store pics from these devices currently. Most file formats can be uploaded from PC's/Macs"
"Ability to set up password profiles that can predefine custom fields and password complexity."
"The user experience and the mobile app could be improved."
"I would love it if you didn't have to re-authenticate when you start up a new browser."
"Needs to provide an API to be integrated with the information systems and offer secure file hosting service with sharing and editing capabilities."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
More CyberArk Privileged Access Manager Pricing and Cost Advice →