Try our new research platform with insights from 80,000+ expert users

BeyondTrust Password Safe vs Fudo PAM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust Password Safe
Ranking in Privileged Access Management (PAM)
9th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
26
Ranking in other categories
Enterprise Password Managers (7th)
Fudo PAM
Ranking in Privileged Access Management (PAM)
22nd
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of July 2025, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Password Safe is 3.3%, up from 2.4% compared to the previous year. The mindshare of Fudo PAM is 2.7%, up from 2.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Ali Hatamleh - PeerSpot reviewer
Smart tooling streamlines account organization and access through advanced grouping features
The features I find valuable in Password Safe include password retention and management, session privilege monitoring, live monitoring and recording, and the use of PS automation scripts for creating connections. The smart tooling and smart group features are also important as, after finalizing discovery, they auto-collect accounts in the environment and organize them in Smart Groups for easy access.
Oleksiy-Zaionchkovskyy - PeerSpot reviewer
Easy to install but needs to provide better server management and organization
I would like to see better server management. You have to know exactly what you're looking for to get the right server. Working with 100 or 200 server installations is comfortable, but not thousands. The scalability isn't very good because it's complicated. I would like more organization. For instance, they could add a table that matches an account to many servers at once. There could also be better education services. They don't have any certification program, at least in Ukraine, so the training is complicated and divided into different pieces. Cisco, for example, has a great education program that starts from the basics and progresses to advanced features.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"BeyondTrust Password Safe has good reporting and Smart Rules which makes it convenient. Though Smart Rules are convenient, those who do not have much experience with such things may find it difficult to understand how these things work. Otherwise, I find Smart Rules very convenient to work with."
"The solution protects organizations from internal and external threats."
"The actual innovations offered by the vendor stand out to me. They are quick to respond to market demands and the changing environment of privileged access management."
"The technical support and customer services are phenomenal."
"BeyondTrust Password Safe is a good PAM tool."
"The best aspect of the product is the ability to onboard devices. You can scan the IP subnets and onboard all the devices. You can then segregate them if it's a network device or a firewall. If it's a Windows server or a UNIX, you can basically scan your IT infrastructure and onboard the efforts, which should be managed. Once they have been onboarded, then the session management and password management are easy and nicely configurable."
"One of the most valuable features is that this is a product designed with enterprises in mind."
"Overall, I rate the solution ten out of ten."
"We are convinced that Fudo PAM is better than competing products like WALLIX."
"Fudo PAM was the most flexible and intuitive interface out of all of the products in the PAM sector."
"Session recording and password management are the two main aspects."
"it's perfect to control and administer computers in our company."
"The main benefit of the solution is that it's very easy to set up. It only takes a couple of hours to install everything."
 

Cons

"The pricing is not cheap, but it could be better."
"The only feature they could improve is the banners because they aren't informative. For example, if something is not correct and I open the error notification, the dialogue box simply says, "This is an error." It would be great if they could provide some valuable comments about how to fix the errors."
"From the client perspective, they usually complain that the RDP session disconnects without error notifications."
"There is a limited capacity on the appliance, which I wasn't informed about when I purchased the product. I can have a maximum of 150 rules per appliance; any more than that and rule processing becomes very complex, especially regarding password revision. Hitting a capacity limit you don't know about can be problematic. Ideally, we would not have a limited capacity, allowing us to be in a completely managed state with password rotation for every service account, not just the highly privileged ones."
"If there was one thing, it would be having the documentation standardized. They should keep the documentation consistent. For example, when BeyondTrust updated one of their admin guides, they left out the information on the discovery account requirements, and then over a period of time, we ended up having to search multiple different documents to put together a string of information for a specific topic, which was problematic. It was minor, but it was problematic. Standardized documentation would be the one thing I would suggest."
"When we deploy BeyondTrust, we have to deploy our own database on a SQL server. It doesn't deploy the database. I wish BeyondTrust packages the whole solution in one and includes the MySQL database so that when you deploy it, it deploys everything for you. BeyondTrust gives you the software, but you are in charge of setting up your own database. It is a single appliance just for the BeyondTrust portion but not the database. Unless that has changed in later releases, you have to set up your own database for BeyondTrust Password Safe. I find that part complex because we then need the expertise and help of the database team to set it up, which also increases the deployment time. If they can deploy the database, it will reduce the deployment time."
"There are multiple features that have issues, although they could be specific to our environment. What we have seen is that whenever a user gets added to the authentication store, the sync between Password Safe and the authentication store, which is generally easy, takes a lot of time. It does not occur immediately."
"The database instance onboarding should be simplified. The problem is that you can scan the assets and databases inside a server, but you cannot onboard them or manage them with the smart tools. It has to be done manually. I think they should try to include more custom platforms."
"Professional training and certification would be great."
"I would like to see better server management. You have to know exactly what you're looking for to get the right server."
"Fudo PAM’s scalability is not very strong."
"The stability is not very good."
"The configuration is difficult."
 

Pricing and Cost Advice

"The pricing of BeyondTrust is very good as compared to other products. That was the main reason we decided to go with BeyondTrust at first."
"We just pay for Password Safe. Session management is included, but we don't use it. There aren't any additional costs besides the standard licensing fees. We pay for an annual license."
"This solution is not cheap—it's a very expensive solution. Very, very expensive compared to the features and functions that they offer."
"At the time, BeyondTrust was significantly cheaper than CyberArk. Pricing-wise, if I remember correctly, it goes by assets. The pricing was negotiated for our instances based on the number of assets that we onboard into the system. It is a little different from CyberArk, where the pricing is by users. So, it depends. If you have a lot of assets, it can get very expensive."
"It has subscription-based licensing. BeyondTrust is three times less expensive than CyberArk."
"When you buy Password Safe and perform your initial Discovery, you have all these servers that are added to your assets in BeyondTrust, but you're not using a license until you actually start managing the systems. BeyondTrust's licensing is based on the systems when they're managed, which means when an administrator is able to connect to the server through BeyondTrust with a managed account. There would be a privileged account on the endpoint when the licensing starts. A significant advantage to that is that there are many organizations that want to evaluate their environment prior to automatic management."
"The pricing structure is better than the competitors. It's much cheaper than CyberArk. They do the licensing on the basis of assets, not on the number of users. For CyberArk, they base the licensing on the number of users, and they have an expensive model of pricing. BeyondTrust has a cheaper model."
"The product is quite affordable."
"The pricing is great. We've been given discounts that make it cheaper than using any other solution."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
860,592 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
15%
Manufacturing Company
9%
Government
8%
Financial Services Firm
18%
Comms Service Provider
11%
Computer Software Company
10%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for BeyondTrust Password Safe?
My experience with BeyondTrust Password Safe's pricing, setup cost, and licensing has been positive, primarily due to its asset-based licensing model. This is a significant advantage for us because...
What needs improvement with BeyondTrust Password Safe?
While generally a strong product, BeyondTrust Password Safe has a few areas that could use some polish. From an administrator's viewpoint, we sometimes see keystroke capturing fail. More significan...
What is your primary use case for BeyondTrust Password Safe?
The main purpose of BeyondTrust Password Safe is for Privileged Access Management, with session monitoring being very effective for risk mitigation. It ensures we adhere to the control standards se...
Ask a question
Earn 20 points
 

Also Known As

BeyondTrust PowerBroker Password Safe
Fudo Privileged Access Management
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL
Find out what your peers are saying about BeyondTrust Password Safe vs. Fudo PAM and other solutions. Updated: June 2025.
860,592 professionals have used our research since 2012.