

Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM).
Money saving is the main part because every organization tries to reduce their costs.
They offer support around the clock, and responses are generally quick.
Support is critical, especially when challenges arise related to PAM.
BeyondTrust support is reliable.
The initial understanding of the environment is crucial, followed by a simple deployment process.
The appliances are stable, and there are no significant issues with backups or recovery.
BeyondTrust Endpoint Privilege Management is very easy to use; if you know the process of cybersecurity, you will not experience downtime.
There is a need for better MQ integration with DevOps and improvements in architecture.
The ability to view recorded live sessions of specific users is a crucial benefit.
Technical support for BeyondTrust Endpoint Privilege Management should be an enterprise edition; whoever is working in the bank sector for security purposes needs to be 100% secure on the servers.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
When any unauthorized user makes an attempt, it notifies the administrators.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
For security purposes in BeyondTrust Endpoint Privilege Management, when employees are working in the system, we can make a recording of the video, showing the modifications and configurations they made, allowing us to see everything.
| Product | Mindshare (%) |
|---|---|
| BeyondTrust Endpoint Privilege Management | 3.1% |
| CyberArk Privileged Access Manager | 10.4% |
| Delinea Secret Server | 4.5% |
| Other | 82.0% |
| Product | Mindshare (%) |
|---|---|
| Symantec Identity Governance and Administration | 5.6% |
| SailPoint Identity Security Cloud | 29.6% |
| Saviynt Identity Cloud | 17.7% |
| Other | 47.099999999999994% |

| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 3 |
| Large Enterprise | 15 |
| Company Size | Count |
|---|---|
| Small Business | 23 |
| Midsize Enterprise | 9 |
| Large Enterprise | 45 |
BeyondTrust Endpoint Privilege Management offers enhanced security through asset discovery and privilege elevation without administrative rights, supporting seamless operations in complex environments.
BeyondTrust Endpoint Privilege Management combines advanced threat detection with powerful tools like application control and session management. It is designed to secure IT infrastructures by removing local admin privileges and facilitating remote application publishing. With integration capabilities and robust compliance support, it is suitable for sectors needing stringent security measures. However, improvements in update frequency, Mac integration, and pricing, along with enhanced reporting and console access, are needed to broaden market reach. Organizations value its scalability and flexibility, despite needing better support and development maturity.
What Features Define BeyondTrust Endpoint Privilege Management?BeyondTrust Endpoint Privilege Management is widely adopted in the finance and healthcare industries for privileged access management and compliance. It is instrumental in secure server access and remote management, aligning with zero-trust approaches and integrating smoothly with enterprise platforms.
Symantec Identity Governance and Administration offers automated management for identity lifecycles, provisioning, and entitlements, featuring easy integration, flexibility, role-based access, and strong compliance support.
This software provides effective identity lifecycle automation, entitlement management, provisioning, and access control while offering codeless customization through Policy and Identity Xpress technology. The integration with multiple applications supports regulatory compliance efforts, enhancing security and operational efficiency with a user-friendly interface. Users appreciate its ease of customization, though challenges in integrating with cloud services and external systems remain. Improvements are needed in technical support, reporting capabilities, and workflows. Its comprehensive identity solutions target sectors like retail, financial, and government, emphasizing risk management and compliance while integrating with HR systems.
What key features does it offer?Organizations in retail, financial, and government sectors utilize this software to streamline identity management and standardize user accounts. Businesses focus on user creation, privilege management, and compliance certification by aligning access with business rules. Integration with HR systems for identity solutions is achieved through technical customizations.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.