We performed a comparison between BeyondTrust Endpoint Privilege Management and Leiberman RED Identity Management [EOL] based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."Scalability is good. I would rate the scalability a nine out of ten."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"Reduces major vulnerabilities by removing local administrator privileges."
"It's more of a risk reduction. It takes passwords that are not being managed properly and manages them automatically which really reduces risk."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"It only has limited support for Mac."
"If you don't get the implementation right at the outset, you will struggle with the product."
"Reports to the end user."
"Its feature for establishing workflows needs improvement."
"They need to come up with better integrative options which should be customer-centric."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"They should improve the application password management. The capability to manage high availability application passwords is its biggest shortcoming."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
Earn 20 points
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Leiberman RED Identity Management [EOL] doesn't meet the minimum requirements to be ranked in Privileged Access Management (PAM). BeyondTrust Endpoint Privilege Management is rated 8.0, while Leiberman RED Identity Management [EOL] is rated 7.8. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Leiberman RED Identity Management [EOL] writes "It’s greatest ability is that it can easily randomize all local accounts on almost any endpoint". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Leiberman RED Identity Management [EOL] is most compared with .
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.