Anonymous UserPAM Architect at a tech services company
ChrisMorrisonTechnical Engineer at a tech services company
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"BeyondTrust Password Safe's features that I have found most valuable are really those that are knitted in. That is their Smart Rules and Smart Groups, where you design your administration model so you create your AD groups and your asset groups, and configure Password Safe."
"Session recording, password rotation, and password vaulting are the most valuable features."
"The privileged account management feature is what I like most."
"This is a cloud-based application, which makes it very easy to deploy."
"The only negative thing I can say is that BeyondTrust was recently bought by Bomgar and the marriage of the multiple companies coming together in the merger has caused a little bit of a hiccup right now in their software versions."
"Its documentation can be improved. Its documentation is currently complicated, and it is not good. It needs to be better. Their technical support can also be improved. It is not bad, but it can be better."
"The initial setup is a bit complex."
"This solution needs better integration with third-party solutions because their ability to support other tools is very weak."
"It has subscription-based licensing. BeyondTrust is three times less expensive than CyberArk."
"It is sad that people with a limited budget won't be able to afford it."
"The price model is based on the number of devices and opposed to the number of users, and it is not very flexible."
Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential. Password Safe enables organizations to achieve complete control and accountability over privileged accounts.
Centrify Privilege Service provides all of your IT administration teams with secure, granular access to infrastructure regardless of location, and without the hassles of a VPN.
Secure browser-based access Authorized IT users launch management sessions for resources directly from the Privilege Service portal. Sessions use SSH and RDP protocols, and are always protected end-to-end.
Access across organizational boundaries Privilege Service enables you to authenticate your IT users through Active Directory, LDAP Centrify Cloud Directory, or Google G Suite
Directory. You can use one or any combination of these identity stores to grant granular access to employees, business partners and outside vendors.
Grant access to specific resources Unlike a VPN, Privilege Service enables you to grant access to
resources on a on a per-resource basis. This means that you can easily give your internal IT admins access to as much of your infrastructure as necessary, while limiting access by an outsourced
team to only the servers and network hardware their business role or IT function requires.
Access from any location Your IT admins can log in and securely access resources from any location that can reach the Privilege Service. For user logins outside the corporate network, you can require Centrify’s built-in multi-factor authentication for security stronger than a user name and password.
BeyondTrust Password Safe is ranked 9th in Enterprise Password Managers with 3 reviews while Centrify Privileged Access Service is ranked 13th in Enterprise Password Managers with 2 reviews. BeyondTrust Password Safe is rated 7.6, while Centrify Privileged Access Service is rated 6.0. The top reviewer of BeyondTrust Password Safe writes "One of the best kept secrets". On the other hand, the top reviewer of Centrify Privileged Access Service writes "Has good privileged account management, multifactor authentication and auditing features". BeyondTrust Password Safe is most compared with Microsoft Azure Key Vault, CyberArk Enterprise Password Vault, HashiCorp Vault and Thycotic Secret Server, whereas Centrify Privileged Access Service is most compared with CyberArk Privileged Access Manager, Thycotic Secret Server, HashiCorp Vault, BeyondTrust Endpoint Privilege Management and ManageEngine PAM360. See our BeyondTrust Password Safe vs. Centrify Privileged Access Service report.
See our list of best Enterprise Password Managers vendors.
We monitor all Enterprise Password Managers reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.