We performed a comparison between BeyondTrust Endpoint Privilege Management and Delinea Secret Server based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Reduces major vulnerabilities by removing local administrator privileges."
"The implementation is quite easy because the documents are always online."
"What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording."
"The solution's technical support is good."
"The product provides a native user experience without requiring users to install additional software or agents."
"Provides us with the ability to control access [to secrets] by groups."
"The most valuable feature is session monitoring."
"Its technical support is good."
"The GUI interface is well-designed and user-friendly."
"It is a stable solution."
"I find it really easy and computer confident, and the experience with the product is really good. Additionally, customizations are easy."
"I have found the password management and the secret management features to be the most valuable. Our customers find its ease of integration and the use of power shells really attractive."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"If you don't get the implementation right at the outset, you will struggle with the product."
"Its feature for establishing workflows needs improvement."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"How the accounts are presented in the solution's UI can be improved."
"I'd prefer a better commercial model that includes partners and options for consulting around it. Where I've worked with my customers, we've only been able to use their professional services, and that has been a risk and constraint."
"The solution could be more user-friendly."
"Documentation could be improved if they were to include more about connectors. There is not enough documentation."
"This product is excellent in every way except minor details in handling extremely large environments."
"One thing that I wish they would do is to have a Kubernetes or container-based deployment supported, but they're not quite there yet. Containerization or support for containerization would be fantastic."
"I formerly used only one service: the remote server. For example, I connected to the Active Directory user and the computer's console. But now, I need to do a remote connection to the domain controller. Maybe it only connects to that tool, the Active Directory users, and the computer management console, but not to the domain controller. Another thing Delinea could add is multi-factor authentication."
"It is expensive compared to other solutions in this category and for what it does."
"One of the things that we want is to be able to do some of the management of it using APIs."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Delinea Secret Server is ranked 2nd in Privileged Access Management (PAM) with 47 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Delinea Secret Server is rated 8.2. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Delinea Secret Server writes "Effective for password rotation policies triggered by audit requirements, it helps maintain compliance standards and seamless integration with third-party tools ". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, ARCON Privileged Access Management and Microsoft Defender for Endpoint, whereas Delinea Secret Server is most compared with CyberArk Privileged Access Manager, Azure Key Vault, HashiCorp Vault, IBM Security Secret Server and BeyondTrust Password Safe. See our BeyondTrust Endpoint Privilege Management vs. Delinea Secret Server report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.