We performed a comparison between BeyondTrust Endpoint Privilege Management and Sectona Privileged Access Management based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution's technical support is good."
"Reduces major vulnerabilities by removing local administrator privileges."
"Scalability is good. I would rate the scalability a nine out of ten."
"Logs that get collected on the Privilege Management console from the agents are very good. They help us to identify the aspects from which we have to whitelist an application."
"I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"A key factor for my company is support, and Sectona Privileged Access Management has good support. Another valuable feature of Sectona Privileged Access Management is that it's easy to onboard."
"The most valuable feature is the risk management. When a Privileged user performs a certain command, such as running a script, the system highlights it in the risk management section as high, critical, or medium risk."
"The most valuable features of Sectona Privileged Access Management include robust session monitoring for privileged users."
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"Its feature for establishing workflows needs improvement."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then."
"Reports to the end user."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"If you don't get the implementation right at the outset, you will struggle with the product."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"Sectona needs to think about SaaS solutions and cloud use cases. For example, we need to be able to integrate Sectona PAM with next-generation applications such as Docker and Lambda, as well as ITD pipelines that use privileged user data."
"I would like to see future updates include robust support for cloud environments as organizations increasingly move towards cloud-based solutions."
"As I don't have at least one to two years of experience with Sectona Privileged Access Management, I cannot share areas for improvement in the solution. To me, Sectona Privileged Access Management has reasonable pricing, but it could still be improved. I'm also unsure if Sectona Privileged Access Management could cover the requirements of large-sized companies, but for small-sized to medium-sized companies, I'd recommend the solution."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
More Sectona Privileged Access Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Sectona Privileged Access Management is ranked 17th in Privileged Access Management (PAM) with 3 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Sectona Privileged Access Management is rated 7.6. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Sectona Privileged Access Management writes "Effective risk management, feature of recording all privileged user activities in a compressed format but limited SaaS capability". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Sectona Privileged Access Management is most compared with ARCON Privileged Access Management and CyberArk Privileged Access Manager. See our BeyondTrust Endpoint Privilege Management vs. Sectona Privileged Access Management report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.