Most Helpful Review
Use BeyondTrust Endpoint Privilege Management? Share your opinion.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"The implementation is quite easy because the documents are always online."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"We like the integration with other systems."
"The compliance features are the most valuable features."
"The community is very active and when I had questions about an issue, I was able to find the resources."
"The solution is very good at the management of the identity lifecycle."
"The solution is stable and reliable."
"Certifications and user provisioning features are the most valuable."
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does."
"Their technical support could be more responsive and helpful."
"I would like to see more Cloud management from this product."
"They should lower the price and technical support should be better."
"The interface should be simple and easier to use."
"Compared to at least one other product some of the administrative tasks could be easier or more intuitive."
"The connectors are far too manual. This needs to be automated a bit."
"The UI needs to be more user friendly. More concentration on historical policy violations would be great. In terms of new features, I would like to see artificial intelligence and machine language added."
Pricing and Cost Advice
"This solution is expensive compared to its competitors."
"The licensing fees are on a yearly basis."
"You do pay one price for the license but that price depends on what you choose to include as far as the optional modules go."
"SailPoint is higher in price as compared to Saviynt. The initial cost of SailPoint is very high. There are additional costs to the standard licensing fees."
Questions from the Community
Top Answer: The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager.
Top Answer: This solution is expensive compared to its competitors.
Top Answer: The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does. This would help because sometimes, you can get… more »
Top Answer: The community is very active and when I had questions about an issue, I was able to find the resources.
Top Answer: This solution is difficult to configure. The interface should be simple and easier to use.
Top Answer: We used this solution in one of our projects for provisioning rights in applications such as Active Directory and Office 365. It was also used for collecting information and centralizing it, which was… more »
out of 30 in Privileged Access Management
Average Words per Review
out of 23 in User Provisioning Software
Average Words per Review
Compared 50% of the time.
Compared 11% of the time.
Compared 6% of the time.
Compared 5% of the time.
Compared 2% of the time.
Compared 11% of the time.
Compared 9% of the time.
Compared 9% of the time.
Compared 8% of the time.
Compared 7% of the time.
Also Known As
|BeyondTrust PowerBroker, PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix||IdentityIQ|
BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.
Key Solutions Include:
-ENTERPRISE PASSWORD SECURITY
Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.
-ENDPOINT LEAST PRIVILEGE
Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.
-SERVER PRIVILEGE MANAGEMENT
Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.
-A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS
Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.
Learn more at https://www.beyondtrust.com/privilege-management
|Identity and access management software that includes compliance and password management, analytics, and user provisioning.|
Learn more about BeyondTrust Endpoint Privilege Management
Learn more about SailPoint IdentityIQ
|Aera Energy LLC, Care New England, James Madison University||Adobe, Aviva, Axa, Tokyo Electron|
Computer Software Company31%
Comms Service Provider24%
Financial Services Firm4%
Computer Software Company32%
Comms Service Provider14%
Financial Services Firm8%
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management with 6 reviews while SailPoint IdentityIQ is ranked 2nd in User Provisioning Software with 6 reviews. BeyondTrust Endpoint Privilege Management is rated 6.6, while SailPoint IdentityIQ is rated 7.8. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Great session management features and out-of-box connectors". On the other hand, the top reviewer of SailPoint IdentityIQ writes "ROI has been outstanding and our user onboarding time has been significantly decreased". BeyondTrust Endpoint Privilege Management is most compared with CyberArk PAS, Thycotic Secret Server, CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine) and Saviynt, whereas SailPoint IdentityIQ is most compared with CyberArk PAS, Symantec Identity Governance and Administration, Microsoft Identity Manager, ForgeRock and One Identity Manager.
See our list of .
We monitor all Privileged Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.