No more typing reviews! Try our Samantha, our new voice AI agent.
BeyondTrust Endpoint Privilege Management Logo

BeyondTrust Endpoint Privilege Management pros and cons

Vendor: BeyondTrust
4.0 out of 5

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

BeyondTrust Endpoint Privilege Management effectively reduces vulnerabilities by removing local administrator privileges and offers excellent application elevate features.
It provides comprehensive session management, including session recording and password management, which sets it apart from competitors like IBM and Thycotic.
The asset discovery and integration capabilities with security vendors such as SailPoint and FortiGuard are highly valuable.
Scalability and stability are top-notch, enabling easy deployment with minimal processing requirements on servers.
BeyondTrust Endpoint Privilege Management enhances security by enforcing least privilege policies, automating asset onboarding, and integrating with various operating systems.

CONS

Limited support for Mac and lack of XWindows Remote Desktop Access protocol for Linux/Unix is a concern.
Reports indicate infrequent updates and rare bug fixes, which can delay the introduction of new features.
Reliance on MS SQL servers and the absence of alternative database support is seen as a limitation.
Initial setup is reported to be complex, even for experienced users.
Technical support is deemed insufficient, requiring improvements in responsiveness and guidance.
 

BeyondTrust Endpoint Privilege Management Pros review quotes

Md Abdul Hakim - PeerSpot reviewer
System Engineer at Corporate Projukti Limited
Jun 12, 2025
BeyondTrust Endpoint Privilege Management is adaptable across Windows, macOS, UNIX, and Linux.
NasirAkbar - PeerSpot reviewer
Presales Engineer at SAUDI PARAMOUNT COMPUTER SYSTEMS
Sep 3, 2025
BeyondTrust Endpoint Privilege Management positively impacts the organization by providing more security and benefits, such as ensuring that if modifications are made, we can see where mistakes occurred in the recording video.
Prashant Uppuluri - PeerSpot reviewer
Solution Architect at FVC
Jan 15, 2025
Administrators need a tool that provides visibility and clarity about endpoint management within the organization. This addresses the issue of managing privileged users, which is crucial for any administrator or higher management team to control.
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,221 professionals have used our research since 2012.
PM
CEO at a non-tech company with 11-50 employees
Feb 10, 2025
The user experience is good, and there are many preconfigured platforms.
Muhammad Baber - PeerSpot reviewer
System Administrator at Alghanim Industries
May 16, 2024
The product is secure.
Marlin B Pohlman - PeerSpot reviewer
Consultant at Visdom
Oct 24, 2022
It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference.
Mohammed-Talukdar - PeerSpot reviewer
Lead Cyber Security Architect at a tech services company with 10,001+ employees
Sep 18, 2023
I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system.
Pradeep Swain - PeerSpot reviewer
Information Technology System Analyst at a tech services company with 1,001-5,000 employees
Jun 9, 2023
Scalability is good. I would rate the scalability a nine out of ten.
reviewer2010753 - PeerSpot reviewer
Senior Specialist at a tech services company with 10,001+ employees
Nov 2, 2022
Logs that get collected on the Privilege Management console from the agents are very good. They help us to identify the aspects from which we have to whitelist an application.
Sandeep Kundargi - PeerSpot reviewer
Technical Lead at a tech vendor with 10,001+ employees
Nov 10, 2023
The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management.
 

BeyondTrust Endpoint Privilege Management Cons review quotes

Md Abdul Hakim - PeerSpot reviewer
System Engineer at Corporate Projukti Limited
Jun 12, 2025
If they improve their price in Bangladesh, since they do not have local partners or local trainers, clients or integrators find it difficult to reach BeyondTrust for support, service, and price quotation.
NasirAkbar - PeerSpot reviewer
Presales Engineer at SAUDI PARAMOUNT COMPUTER SYSTEMS
Sep 3, 2025
Technical support for BeyondTrust Endpoint Privilege Management should be an enterprise edition; whoever is working in the bank sector for security purposes needs to be 100% secure on the servers.
Prashant Uppuluri - PeerSpot reviewer
Solution Architect at FVC
Jan 15, 2025
Improvements could focus on adding more AI features to automate processes that are currently manual or challenging for end users.
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,221 professionals have used our research since 2012.
PM
CEO at a non-tech company with 11-50 employees
Feb 10, 2025
There is a need for better MQ integration with DevOps and improvements in architecture.
Muhammad Baber - PeerSpot reviewer
System Administrator at Alghanim Industries
May 16, 2024
We faced some challenges with remote desktop sessions.
Marlin B Pohlman - PeerSpot reviewer
Consultant at Visdom
Oct 24, 2022
There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product.
Mohammed-Talukdar - PeerSpot reviewer
Lead Cyber Security Architect at a tech services company with 10,001+ employees
Sep 18, 2023
The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months.
Pradeep Swain - PeerSpot reviewer
Information Technology System Analyst at a tech services company with 1,001-5,000 employees
Jun 9, 2023
The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult.
reviewer2010753 - PeerSpot reviewer
Senior Specialist at a tech services company with 10,001+ employees
Nov 2, 2022
It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then.
Sandeep Kundargi - PeerSpot reviewer
Technical Lead at a tech vendor with 10,001+ employees
Nov 10, 2023
A valuable enhancement could be the capability to deploy agents directly through the console.