We performed a comparison between BeyondTrust Endpoint Privilege Management and UserLock based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"Reduces major vulnerabilities by removing local administrator privileges."
"I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording."
"Technical support is good."
"The tool is easy to use and deploy. It has PAM capabilities like privilege access. The solution helps with the management of third parties and vendors. It is an effective solution compared to other alternatives."
"The solution's technical support is good."
"The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us."
"I find the solution’s features like section management, password management, and analytics valuable."
"The most valuable features are two-factor authentication and real-time logon monitoring."
"We mainly implemented UserLock for multi-factor authentication, but the user login insights are also nice."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"If you don't get the implementation right at the outset, you will struggle with the product."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"Reports to the end user."
"Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful."
"It only has limited support for Mac."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
"I would like to see UserLock add the ability to automatically create a group policy in Active Directory. That might streamline the setup process."
"The product and service are already great as it is but if I could add one feature, I guess it would be nice to have another factor of authentication (two additional factors) like your phone and a token for example, for when people forget their phone at home."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
Earn 20 points
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while UserLock is ranked 11th in Authentication Systems. BeyondTrust Endpoint Privilege Management is rated 8.0, while UserLock is rated 10.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of UserLock writes "Affordable, easy to use, and integrates well with Active Directory". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas UserLock is most compared with Cisco Duo, Microsoft Entra ID, Fortinet FortiAuthenticator, Silverfort and Aruba ClearPass.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.