Compare BeyondTrust Endpoint Privilege Management vs. Thycotic Secret Server

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use BeyondTrust Endpoint Privilege Management? Share your opinion.
Find out what your peers are saying about BeyondTrust Endpoint Privilege Management vs. Thycotic Secret Server and other solutions. Updated: November 2020.
448,076 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording.""The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file.""The implementation is quite easy because the documents are always online.""The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager.""The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager.""BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."

More BeyondTrust Endpoint Privilege Management Pros »

"The ability to give some groups access to different kind of databases with the storage of a password is the most valuable feature.""The most valuable feature of this solution is the random changing of passwords.""Provides us with the ability to control access [to secrets] by groups.""It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment.""Ease of use because of its monolithic software.""The most valuable feature is session monitoring.""The user interface is quite good. It's very straightforward.""I find it really easy and computer confident, and the experience with the product is really good. Additionally, customizations are easy."

More Thycotic Secret Server Pros »

Cons
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers.""The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features.""The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process.""The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does.""Their technical support could be more responsive and helpful."

More BeyondTrust Endpoint Privilege Management Cons »

"I don't know what kind of a cryptographic it uses to encrypt the password but it should be one of the stronger ones. Some of the cryptos have been accessed by hackers.""We could definitely use some help with API tokenization. If we had a way to store tokens that would be fabulous.""One of the things that we want is to be able to do some of the management of it using APIs.""I would like to see the shadowing of ongoing terminal sessions (Remote Desktop Mirroring).""Documentation could be improved if they were to include more about connectors. There is not enough documentation.""Having more detailed reporting would improve this solution.""There could be tweaks here and there. For example, instead of going to one main function to do this and another main function to do that, the solution could remap the user interface so that a person only has to go through one function. The way that function branches off should make a bit more sense.""There are some things that I know are really important to include like A/B version features which are available in Windows. I would say that they should be included in the road map."

More Thycotic Secret Server Cons »

Pricing and Cost Advice
"This solution is expensive compared to its competitors."

More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice »

"It isn't terribly expensive.""The price of this solution is good.""Pricing is comparable to competing products.""The pricing is standard in this business and we have no complaints about it.""Its price is okay. We don't compete on pricing. We seldom use price to win over our competitors. We prefer it this way because if we can sustain the price, we make more margin as well. We don't want the price to go down to the bottom where despite the win, there's no margin at all.""Secret Server is expensive when compared to the cost to some alternatives.""There are different plans and additional licensing costs that can be instituted for add-ons."

More Thycotic Secret Server Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Privileged Access Management solutions are best for your needs.
448,076 professionals have used our research since 2012.
Questions from the Community
Top Answer: The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager.
Top Answer: The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does. This would help because sometimes, you can get… more »
Top Answer: The GUI interface is well-designed and user-friendly.
Top Answer: I think the pricing of Thycotic and CyberArk products are very similar.
Top Answer: If you look at Thycotic, it is a great product that has pretty much all the same features as CyberArk — which will be replacing it. There is not much difference between the two. We will be switching… more »
Ranking
Views
8,400
Comparisons
4,855
Reviews
2
Average Words per Review
604
Avg. Rating
6.5
Views
10,150
Comparisons
6,481
Reviews
11
Average Words per Review
452
Avg. Rating
8.2
Popular Comparisons
Also Known As
BeyondTrust PowerBroker, PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix
Learn
BeyondTrust
Thycotic
Overview

BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.

Key Solutions Include:

-ENTERPRISE PASSWORD SECURITY

Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.

-ENDPOINT LEAST PRIVILEGE

Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.

-SERVER PRIVILEGE MANAGEMENT

Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.

-A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS

Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.

Learn more at https://www.beyondtrust.com/privilege-management

Secret Server is the only fully featured Privileged Account Management (PAM) solution available both on premise and in the cloud. It empowers security and IT ops teams to secure and manage all types of privileged accounts and offers the fastest time to value of any PAM solution.

Offer
Learn more about BeyondTrust Endpoint Privilege Management
Learn more about Thycotic Secret Server
Sample Customers
Aera Energy LLC, Care New England, James Madison UniversitySecure-24, University of San Diego, International Rescue Committee, San Francisco Ballet, Perkins Coie, University of San Diego, D.S.S. Limited, Turbo's Hoet, Eclipse Computing, Cathay Bank, Stellarise, J&R Consulting
Top Industries
VISITORS READING REVIEWS
Computer Software Company31%
Comms Service Provider24%
Insurance Company6%
Financial Services Firm4%
VISITORS READING REVIEWS
Computer Software Company33%
Comms Service Provider17%
Government6%
Insurance Company5%
Company Size
REVIEWERS
Small Business58%
Midsize Enterprise8%
Large Enterprise33%
REVIEWERS
Small Business31%
Midsize Enterprise31%
Large Enterprise38%
Find out what your peers are saying about BeyondTrust Endpoint Privilege Management vs. Thycotic Secret Server and other solutions. Updated: November 2020.
448,076 professionals have used our research since 2012.

BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management with 6 reviews while Thycotic Secret Server is ranked 3rd in Privileged Access Management with 12 reviews. BeyondTrust Endpoint Privilege Management is rated 6.6, while Thycotic Secret Server is rated 8.2. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Great session management features and out-of-box connectors". On the other hand, the top reviewer of Thycotic Secret Server writes "Excellent access management that can serve very large networks". BeyondTrust Endpoint Privilege Management is most compared with CyberArk PAS, CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), WALLIX Bastion and Symantec Privileged Access Manager, whereas Thycotic Secret Server is most compared with CyberArk PAS, HashiCorp Vault, IBM Security Secret Server, Microsoft Azure Key Vault and CyberArk Enterprise Password Vault. See our BeyondTrust Endpoint Privilege Management vs. Thycotic Secret Server report.

See our list of best Privileged Access Management vendors.

We monitor all Privileged Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.