We performed a comparison between BeyondTrust Endpoint Privilege Management and Trend Micro Deep Security based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The solution's technical support is good."
"I find the solution’s features like section management, password management, and analytics valuable."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"It scales easily and the product is stable."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"Aside from the basic antivirus features, there are additional features such as vulnerability protection, firewall, etc. which are helpful."
"The most valuable features of the solution we have enabled in our organization are its anti-malware capabilities, applications, web reputation, and integrity monitoring."
"There is no competition for this product, as no other product provides HIPS, host-firewall, and anti-malware together."
"There are compliance issues for legacy applications and after applying OS security patches. The product's HIPS (Host Intrusion Prevention System) modules do the job for you automatically, without any downtime."
"Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product."
"We've found stability to be great so far."
"There are a good signature set and a high rate of detection."
"It is a stable solution...The solution's initial setup was straightforward."
"The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does."
"They need to come up with better integrative options which should be customer-centric."
"How the accounts are presented in the solution's UI can be improved."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"Its feature for establishing workflows needs improvement."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"Reports to the end user."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"The support for email protection can be improved."
"I think more work could be done on Deep Security's ability to handle dynamic threat scenarios."
"There should be signature-based advanced and responsive features."
"If I had more reporting, the product would be an A plus."
"I would rate tech support in the range of six to eight out of 10. Time to provide solution could be improved."
"I would like them to add EDR features, moving away from traditional signature-based anti-malware."
"Trend Micro is scalable if you have the budget for it."
"The situation with the currency in Turkey makes this solution a little bit on the expensive side, and if it were lowered then it would be more competitive."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 80 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Trend Micro Deep Security is rated 8.6. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Trend Micro Deep Security writes "Offers excellent endpoint protection and great stability ". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and VMware Carbon Black Endpoint.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.