We performed a comparison between BeyondTrust Endpoint Privilege Management and Symantec Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording."
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"The solution's technical support is good."
"We can enforce complicated password policies and very important frequent password changes."
"It will provide us with more security."
"Stability is solid as a rock."
"It reduces the viral attacks on my website. It also allows certain users access to see what happens daily."
"You can do A2A integration. You can have your own script, which can then run outside of PA to retrieve the password and perform other tasks."
"For me, it is the robust API which is the most valuable feature. This allows for low maintenance costs and allows applications to automatically connect. This is great to automate security of the DevOps pipeline for shared secrets across environments. Also, being on Linux and a virtual appliance is great."
"The RDP-gateway: For limiting which server an operator can access."
"Comprehensive coverage of the required features for the PAM solution."
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"Their technical support could be more responsive and helpful."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"They should include some assignments in the test environment to explore the product's features."
"I’m no fan of Java as an application front-end, as it tends to have issues depending on what browser one’s using."
"We have to do a lot of manual work to automate features."
"The response time for support could be faster. Some features should be added: cloud-based, VPN-less, more secure, and it should be adjusted in a hybrid environment."
"It's difficult to locate the reports, there are limits on what reports can be run from the GUI, and the report formats are lacking."
"We experience stability issues after every patch upgrade. This is a place where CA needs to improve drastically."
"They need to do a little bit more on the mainframe side."
"What I hope happens with the new product CA PAM is to keep all the useful features that exist in PA, but what I’ve noticed with many new products is the UI gets polished but systems lags stability and performance or it adds additional complexity instead of simplifying the user experience."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
More Symantec Privileged Access Manager Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Symantec Privileged Access Manager is ranked 18th in Privileged Access Management (PAM) with 50 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Symantec Privileged Access Manager is rated 7.8. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Symantec Privileged Access Manager writes "Allows IT and consultants to access the infrastructure environment but needs more security and better support". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and WALLIX Bastion, whereas Symantec Privileged Access Manager is most compared with CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), ARCON Privileged Access Management, Delinea Secret Server and VMware Identity Manager. See our BeyondTrust Endpoint Privilege Management vs. Symantec Privileged Access Manager report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.