We performed a comparison between BeyondTrust Endpoint Privilege Management and Delinea Secret Server based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"Technical support is good."
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"Reduces major vulnerabilities by removing local administrator privileges."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"The solution's technical support is good."
"It works for us."
"Provides us with the ability to control access [to secrets] by groups."
"Delinea's network integration is the most useful. For example, I use a Check Point firewall connect to SmartConsole, so I need to do a lot of configuration in Delinea Secret Server. Native integration with Check Point is valuable. You can also go download whatever API you need from the cloud, whether you're using Check Point, Palo Alto, etc. Enriched discovery is another good feature. If you are dealing with several kinds of systems, you can see which system requires privileged access to my network."
"The solution is scalable."
"The product provides a native user experience without requiring users to install additional software or agents."
"Support is helpful."
"I like the one-way hash, as well as the ability to store it in the cloud and access it from anywhere."
"The GUI interface is well-designed and user-friendly."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful."
"It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"It only has limited support for Mac."
"Reports to the end user."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment."
"In terms of what could be improved, the whole thing with distributed engines, et cetera, is a little bit tricky."
"I would like to see the shadowing of ongoing terminal sessions (Remote Desktop Mirroring)."
"The initial setup and deployment can be cumbersome."
"One of the things that we want is to be able to do some of the management of it using APIs."
"We faced some upgrade issues, especially during the management and administration parts. I found it less straightforward than on many other platforms, even outside password managers."
"The solution could be more user-friendly."
"It is expensive compared to other solutions in this category and for what it does."
"They could improve the container platform and SPO."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Delinea Secret Server is ranked 2nd in Privileged Access Management (PAM) with 47 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Delinea Secret Server is rated 8.2. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Delinea Secret Server writes "Effective for password rotation policies triggered by audit requirements, it helps maintain compliance standards and seamless integration with third-party tools ". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, ARCON Privileged Access Management and Microsoft Defender for Endpoint, whereas Delinea Secret Server is most compared with CyberArk Privileged Access Manager, Azure Key Vault, HashiCorp Vault, IBM Security Secret Server and CyberArk Enterprise Password Vault. See our BeyondTrust Endpoint Privilege Management vs. Delinea Secret Server report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.