

BeyondTrust Endpoint Privilege Management and BeyondTrust Password Safe are leaders in the cybersecurity space. BeyondTrust Password Safe appears to have the upper hand due to its comprehensive features, suggested by user reviews, despite Endpoint Privilege Management's favorable feedback on pricing and support.
Features: BeyondTrust Endpoint Privilege Management is recognized for managing user privileges with effective policies that minimize risk. Its flexibility and cross-platform capabilities are notable. Conversely, BeyondTrust Password Safe provides secure password management, robust protection, and easy integration with existing systems. It is appreciated for scalability and detailed reporting functionalities.
Room for Improvement: BeyondTrust Endpoint Privilege Management could improve performance speed and policy creation tools. BeyondTrust Password Safe users highlight the complexity of initial setup and desire more streamlined updates. Password Safe users show slightly more satisfaction with potential improvements.
Ease of Deployment and Customer Service: BeyondTrust Endpoint Privilege Management benefits from flexible deployment and responsive customer service. BeyondTrust Password Safe faces a more challenging deployment but offers strong technical support. Users find Endpoint Privilege Management easier to deploy, with Password Safe excelling in post-deployment support.
Pricing and ROI: Users of BeyondTrust Endpoint Privilege Management are content with setup costs and report good ROI due to its effectiveness. BeyondTrust Password Safe users consider the cost justified by its features and high ROI from improved password governance. Endpoint Privilege Management's pricing is more competitive, while Password Safe's advanced features provide long-term value.
Money saving is the main part because every organization tries to reduce their costs.
Next year, we may add another BeyondTrust element because the overall experience has been good.
Support is critical, especially when challenges arise related to PAM.
They offer support around the clock, and responses are generally quick.
BeyondTrust support is reliable.
The tickets for minor issues have been resolved efficiently.
One person gets aligned for troubleshooting and maintenance activities during their downtime, and within an hour, they complete these tasks.
The support and maintenance from BeyondTrust are commendable.
The initial understanding of the environment is crucial, followed by a simple deployment process.
If using the built-in database, it requires good knowledge in Microsoft SQL, which could complicate scalability.
BeyondTrust Password Safe is scalable and stable from my perspective, as if you increase your CPU and RAM, you can use as many user licenses as you want on a single platform.
In my experience, the scalability of BeyondTrust Password Safe is also a nine.
The appliances are stable, and there are no significant issues with backups or recovery.
BeyondTrust Endpoint Privilege Management is very easy to use; if you know the process of cybersecurity, you will not experience downtime.
In BeyondTrust Password Safe, the upgrade activity can take longer, and I have occasionally experienced being stuck during appliance version upgrades.
The solution is very stable.
The ability to view recorded live sessions of specific users is a crucial benefit.
There is a need for better MQ integration with DevOps and improvements in architecture.
This product is highly ranked on Gartner, Peers, and other review sites.
This feature would allow PAM to check the credentials of privileged accounts, indicating if they are correct or not, showing if the heartbeat has failed if they are wrong.
This would help in identifying suspicious activities immediately when users log in.
There are limitations when accessing or creating connectors for each application.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
The pricing model is more affordable with the option of going for either unlimited devices or users.
Pricing is managed by a different team, however, I know it's less expensive than CyberArk Privilege Access.
My experience with the pricing, setup cost, and licensing of BeyondTrust Password Safe is good because we have an asset-based license, not a user-based one, allowing us to add many clients with privilege access.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
When any unauthorized user makes an attempt, it notifies the administrators.
For security purposes in BeyondTrust Endpoint Privilege Management, when employees are working in the system, we can make a recording of the video, showing the modifications and configurations they made, allowing us to see everything.
BeyondTrust JIT (Just-in-Time) Access helps minimize risks in the organization by allowing privileged accounts to be provisioned temporarily, granting users elevated access only for the required duration.
The flexibility of the licensing model is significantly better as it offers both unlimited users and unlimited devices, unlike Delinea, which is based on the number of users.
The features I find valuable in Password Safe include password retention and management, session privilege monitoring, live monitoring and recording, and the use of PS automation scripts for creating connections.
| Product | Mindshare (%) |
|---|---|
| BeyondTrust Endpoint Privilege Management | 3.1% |
| BeyondTrust Password Safe | 2.7% |
| Other | 94.2% |


| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 3 |
| Large Enterprise | 15 |
| Company Size | Count |
|---|---|
| Small Business | 13 |
| Midsize Enterprise | 5 |
| Large Enterprise | 10 |
BeyondTrust Endpoint Privilege Management offers enhanced security through asset discovery and privilege elevation without administrative rights, supporting seamless operations in complex environments.
BeyondTrust Endpoint Privilege Management combines advanced threat detection with powerful tools like application control and session management. It is designed to secure IT infrastructures by removing local admin privileges and facilitating remote application publishing. With integration capabilities and robust compliance support, it is suitable for sectors needing stringent security measures. However, improvements in update frequency, Mac integration, and pricing, along with enhanced reporting and console access, are needed to broaden market reach. Organizations value its scalability and flexibility, despite needing better support and development maturity.
What Features Define BeyondTrust Endpoint Privilege Management?BeyondTrust Endpoint Privilege Management is widely adopted in the finance and healthcare industries for privileged access management and compliance. It is instrumental in secure server access and remote management, aligning with zero-trust approaches and integrating smoothly with enterprise platforms.
BeyondTrust Password Safe is a robust Privileged Access Management tool designed to secure access to servers, databases, and applications. It automates onboarding, rotation, and integration processes, enhancing efficiency and compliance with advanced security measures.
BeyondTrust Password Safe offers a comprehensive approach to managing privileged accounts, integrating smoothly into organizational frameworks to bolster security protocols. Its standout capabilities include session recording, Smart Rules for onboarding automation, and sophisticated auditing tools that support compliance and real-time monitoring. While it exhibits high availability and facilitates seamless usability, enhancements are needed in management console integration, documentation, and installation processes. Users benefit from its password rotation and policy enforcement, despite facing challenges with authentication sync times and session disconnects.
What are the core features of BeyondTrust Password Safe?In industries with stringent security demands, BeyondTrust Password Safe is employed to safeguard privileged accounts, ensuring compliance with regulatory requirements. It is crucial for sectors like finance and healthcare, where access to sensitive data must be tightly controlled and monitored.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.