We performed a comparison between BeyondTrust Endpoint Privilege Management and SailPoint IdentityIQ based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"Technical support is good."
"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"Logs that get collected on the Privilege Management console from the agents are very good. They help us to identify the aspects from which we have to whitelist an application."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"The community is very active and when I had questions about an issue, I was able to find the resources."
"The tool is quite stable and user-friendly."
"Access certification and provisioning are two of the solutions most valuable features."
"The solution is stable and reliable."
"The tool's GUI is user-friendly."
"It is simple and easy to implement."
"The most valuable feature for our customers and for us is the identity data warehouse."
"I find the built-in connectors, lifecycle management, certification, and recertification features to be the most valuable."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"Their technical support could be more responsive and helpful."
"The product should improve its price."
"It only has limited support for Mac."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then."
"If you don't get the implementation right at the outset, you will struggle with the product."
"Compared to at least one other product some of the administrative tasks could be easier or more intuitive."
"The product has poor reporting and analytic capabilities. Reports are not easy to use and its analytic capabilities are limited."
"Additional details during account aggregation failures to help quick troubleshooting."
"The user interface is not very user-friendly."
"The product must improve its support."
"They should lower the price and technical support should be better."
"It allowed to implement the automated processes when a new employee is hired. It allows to have a main central process for new hires."
"I think that the onboarding framework could be improved."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while SailPoint IdentityIQ is ranked 1st in User Provisioning Software with 61 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while SailPoint IdentityIQ is rated 8.2. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of SailPoint IdentityIQ writes "Flexible, easy to customize, and not too difficult to set up". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and CrowdStrike Falcon, whereas SailPoint IdentityIQ is most compared with Saviynt, Microsoft Entra ID, One Identity Manager, ForgeRock and Okta Workforce Identity.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.