Compare BeyondTrust Endpoint Privilege Management vs. Varonis Data Governance Suite

Cancel
You must select at least 2 products to compare!
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management. Updated: November 2020.
447,846 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"This solution is expensive compared to its competitors."

More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Privileged Access Management solutions are best for your needs.
447,846 professionals have used our research since 2012.
Questions from the Community
Top Answer: The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager.
Top Answer: The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does. This would help because sometimes, you can get… more »
Ask a question

Earn 20 points

Ranking
Views
8,397
Comparisons
4,794
Reviews
2
Average Words per Review
592
Avg. Rating
6.5
8th
out of 28 in Data Governance
Views
2,885
Comparisons
2,451
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Popular Comparisons
Also Known As
BeyondTrust PowerBroker, PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for UnixData Governance Suite
Learn
BeyondTrust
Varonis
Overview

BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.

Key Solutions Include:

-ENTERPRISE PASSWORD SECURITY

Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.

-ENDPOINT LEAST PRIVILEGE

Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.

-SERVER PRIVILEGE MANAGEMENT

Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.

-A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS

Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.

Learn more at https://www.beyondtrust.com/privilege-management

In information security, context is king. And context is enhanced drastically when products are integrated as part of a unified platform. A Data Security Platform (DSP) is a category of security products that replaces traditionally disparate security tools. DSPs combine data protection capabilities such as sensitive data discovery, data access governance, user behavior analytics, advanced threat detection, activity monitoring, and compliance reporting, and integrate with adjacent security technologies. The Varonis Data Security Platform (DSP) protects enterprise data against insider threats, data breaches and cyberattacks by analyzing content, accessibility of data and the behavior of the people and machines that access data to alert on misbehavior, enforce a least privilege model and automate data management functions. Learn more about the Varonis Data Security Platform → www.varonis.com
Offer
Learn more about BeyondTrust Endpoint Privilege Management
Learn more about Varonis Data Governance Suite
Sample Customers
Aera Energy LLC, Care New England, James Madison UniversityNottingham Building Society
Top Industries
VISITORS READING REVIEWS
Computer Software Company31%
Comms Service Provider24%
Insurance Company6%
Financial Services Firm4%
VISITORS READING REVIEWS
Computer Software Company45%
Comms Service Provider11%
Insurance Company6%
Non Profit6%
Company Size
REVIEWERS
Small Business58%
Midsize Enterprise8%
Large Enterprise33%
No Data Available
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management. Updated: November 2020.
447,846 professionals have used our research since 2012.

BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management with 6 reviews while Varonis Data Governance Suite is ranked 8th in Data Governance. BeyondTrust Endpoint Privilege Management is rated 6.6, while Varonis Data Governance Suite is rated 0.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Great session management features and out-of-box connectors". On the other hand, BeyondTrust Endpoint Privilege Management is most compared with CyberArk PAS, Thycotic Secret Server, CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine) and ForgeRock, whereas Varonis Data Governance Suite is most compared with SailPoint IdentityIQ, BigID, Informatica Axon, Collibra Governance and ObserveIT.

See our list of .

We monitor all Privileged Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.