Compare BeyondTrust Endpoint Privilege Management vs. Saviynt

Cancel
You must select at least 2 products to compare!
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management. Updated: November 2020.
447,228 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording.""The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file.""The implementation is quite easy because the documents are always online.""The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager.""The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager.""BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."

More BeyondTrust Endpoint Privilege Management Pros »

"Saviynt has better integration with enterprise systems like SAP, Microsoft, Adobe, and AWS.""This product works well out of the box and if you don’t want to do a lot of configuration then this is the best tool.""It's a highly functional system and a very well rounded solution. The onboarding of applications is solid. Their user access reviews are very good. Their role-based model and their identity life cycle stuff are solid. It's a very well rounded, strong product.""The dedicated Freshdesk platform is a user community and a step in the right direction for offering learning resources.""Saviynt has a lot of potential with many features available for users."

More Saviynt Pros »

Cons
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers.""The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features.""The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process.""The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does.""Their technical support could be more responsive and helpful."

More BeyondTrust Endpoint Privilege Management Cons »

"Saviynt cannot customize based on customer needs.""The biggest drawback is that for every change you want to make, you have to go back to them and ask for it.""In terms of improvement, it's really just a matter of them getting more mature. It's a relatively new solution and they probably need to streamline a few of the processes as they mature. But there are not too many problems.""The product lacks a broad user base which makes it difficult sometimes to find answers to questions about the product.""The company needs to do more to establish standard practices within the product itself that are common in the industry."

More Saviynt Cons »

Pricing and Cost Advice
"This solution is expensive compared to its competitors."

More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice »

"If you need to make any changes then there are additional fees."

More Saviynt Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Privileged Access Management solutions are best for your needs.
447,228 professionals have used our research since 2012.
Questions from the Community
Top Answer: The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager.
Top Answer: The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does. This would help because sometimes, you can get… more »
Top Answer: This product works well out of the box and if you don’t want to do a lot of configuration then this is the best tool.
Top Answer: If you need to make any changes then there are additional fees. For example, if there is a user named Jonathan in the system and you want to change it then you have to pay for the change. It has to be… more »
Top Answer: The biggest drawback is that for every change you want to make, you have to go back to them and ask for it. There haven’t got a tool to make modifications. Ideally, we would like to be able to make… more »
Ranking
Views
8,397
Comparisons
4,794
Reviews
2
Average Words per Review
592
Avg. Rating
6.5
6th
Views
5,093
Comparisons
4,198
Reviews
4
Average Words per Review
568
Avg. Rating
7.3
Popular Comparisons
Compared 28% of the time.
Compared 14% of the time.
Compared 10% of the time.
Compared 9% of the time.
Also Known As
BeyondTrust PowerBroker, PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix
Learn
BeyondTrust
Saviynt
Overview

BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.

Key Solutions Include:

-ENTERPRISE PASSWORD SECURITY

Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.

-ENDPOINT LEAST PRIVILEGE

Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.

-SERVER PRIVILEGE MANAGEMENT

Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.

-A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS

Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.

Learn more at https://www.beyondtrust.com/privilege-management

Saviynt provides intelligent identity access management and governance for cloud, hybrid and on-premise IT infrastructures to accelerate enterprise digital transformation. Our platform integrates with leading IaaS, PaaS, and SaaS applications including AWS, Azure, Oracle EBS, SAP HANA, SAP, Office 365, SalesForce, Workday, and many others. Our innovative IGA 2.0 advanced risk analytics platform won the Trust Award and was named an industry leader by Gartner.Identity Governance and Administration (IGA), Data Access Governance (DAG), IaaS Governance, Segregation of Duties (SoD), Consumer Identity and Access Mgmt (CIAM), Cloud PAM, Cloud Security, Hybrid ITPaul • Sep 17, 3:33 PM

Offer
Learn more about BeyondTrust Endpoint Privilege Management
Learn more about Saviynt
Sample Customers
Aera Energy LLC, Care New England, James Madison UniversityShell, McKesson, Kimberly-Clark, Ingram Micro, Intermountain Health Care, Forterra, CoreLogic
Top Industries
VISITORS READING REVIEWS
Computer Software Company31%
Comms Service Provider24%
Insurance Company6%
Financial Services Firm4%
VISITORS READING REVIEWS
Computer Software Company40%
Retailer9%
Comms Service Provider9%
Insurance Company8%
Company Size
REVIEWERS
Small Business58%
Midsize Enterprise8%
Large Enterprise33%
No Data Available
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management. Updated: November 2020.
447,228 professionals have used our research since 2012.
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management with 6 reviews while Saviynt is ranked 6th in Identity Management (IM) with 4 reviews. BeyondTrust Endpoint Privilege Management is rated 6.6, while Saviynt is rated 7.2. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Great session management features and out-of-box connectors". On the other hand, the top reviewer of Saviynt writes "The way the tool is introduced to the user lacks industry standards and better learning resources". BeyondTrust Endpoint Privilege Management is most compared with CyberArk PAS, Thycotic Secret Server, CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine) and IBM Security Secret Server, whereas Saviynt is most compared with SailPoint IdentityNow, SailPoint IdentityIQ, Okta Workforce Identity, CyberArk PAS and OpenIAM Identity Governance.

See our list of .

We monitor all Privileged Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.