We performed a comparison between BeyondTrust Endpoint Privilege Management and Oracle Identity Governance based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"I find the solution’s features like section management, password management, and analytics valuable."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"The support service of Oracle is good. We use it a lot and their response is quick."
"I have found the OIM Connector framework, based on ICF, to be the most valuable feature."
"The most important feature is the connectors. Without the connectors, it can do nothing."
"The most valuable feature is the flexible automation functionality which has optimized our user access privilege management. This has allowed us to create and delete user accounts more accurately and efficiently. This feature has enabled us to save time and resources needed to perform mundane manual tasks."
"It helps provision the required accesses through policies, approvals, and whatever would be the business requirement."
"OIM in my organization has improved its use and dependability, allowing us to pass audit each time."
"Oracle Identity manager is the best tool in the market for access managers."
"I am able to request any access rights I need."
"Its feature for establishing workflows needs improvement."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"Their technical support could be more responsive and helpful."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"It only has limited support for Mac."
"The solution should be easy to implement with components combined in one file and built-in features to integrate target applications without having to install additional connectors."
"Automation of validation exercises performed by humans over Recon Exceptions generated as a result of an access synchronization event over a user's need for access or not."
"Simplify & add more functionality to Identity Cloud Service (IDCS)."
"It's a complex solution, so it will take time in terms of deployment."
"An area for improvement in Oracle Identity Governance is that it isn't refreshed or updated as much. The only area that changed on it in the last five years was the GUI. The solution still has the same installation, troubleshooting, and configuration. Oracle Identity Governance is still very complicated when compared to other solutions. It seems that Oracle doesn't focus too much on Oracle Identity Governance in terms of making some improvements to it."
"Identity Governance is a difficult tool to work with. You have to input many models to understand what is happening with the logins. The user interface is not so good. And a lot of the features we use aren't available out of the box."
"I would like to see more segregation managed through Oracle Identity Manager."
"The solution needs to improve its web interface in the next release."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Oracle Identity Governance is ranked 10th in Identity Management (IM) with 66 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Oracle Identity Governance is rated 7.4. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Oracle Identity Governance writes "A scalable solution designed to meet the requirements of medium and large-sized companies". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Oracle Identity Governance is most compared with SailPoint IdentityIQ, One Identity Manager, CyberArk Privileged Access Manager, Saviynt and Systancia Identity.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.