No more typing reviews! Try our Samantha, our new voice AI agent.

BeyondTrust Password Safe vs Fudo PAM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust Password Safe
Ranking in Privileged Access Management (PAM)
9th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
27
Ranking in other categories
Enterprise Password Managers (10th)
Fudo PAM
Ranking in Privileged Access Management (PAM)
24th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Password Safe is 2.7%, down from 2.8% compared to the previous year. The mindshare of Fudo PAM is 2.4%, down from 2.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
BeyondTrust Password Safe2.7%
Fudo PAM2.4%
Other94.9%
Privileged Access Management (PAM)
 

Featured Reviews

PawanShirose - PeerSpot reviewer
Associate Security Consultant at CyberSec Consulting
Has enabled bulk onboarding and password rotation while ensuring secure privilege management
I have faced stability issues when upgrading BeyondTrust Password Safe solution. The upgrade process can be lengthy compared to other modules. For example, upgrading the appliance and reconfiguring HA is easier in PRA. However, in BeyondTrust Password Safe, the upgrade activity can take longer, and I have occasionally experienced being stuck during appliance version upgrades, sometimes duplicating the upgrade. Regarding additional features, we have good features in BeyondTrust Password Safe compared to other modules, such as Secret Safe to secure secrets and the check-in, check-out functionality. We already have the main features, but I think it would be helpful if BeyondTrust implemented a heartbeat check feature on the privileged account level. This feature would allow PAM to check the credentials of privileged accounts, indicating if they are correct or not, showing if the heartbeat has failed if they are wrong.
TD
BDM at Oberig-it
Works with SCTP, STTPS, SQL, and MySQL protocols
There are some areas for improvement in the Fudo PAM cake that we want to improve in terms of scaling. Scaling is an optional feature because we closed some big projects with enterprise customers from different countries, including Ukraine, Kaloxetine, Uzbekistan, and others. We closed projects in different areas with customers of different sizes. When we talk about enterprise customers, we should consider that they have different use cases and desires for Fudo PAM. We compared our options for customers to choose their vendors, and we discovered Fudo PAM has few scaling options. In Fudo PAM, there should be additional features for scaling and organizing remote sessions for remote systems in remote networks.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The ability to manage privileged account passwords is the most valuable feature, giving us the capability of rotating passwords as soon as an event is triggered."
"It is very easy to deploy. It's easy to use. That's the major thing I like about it."
"Session recording, password rotation, and password vaulting are the most valuable features."
"It provides integrated password and session management in one solution, which is important for us because, from an auditing standpoint, we are accountable for the type of access being used. We need to ensure that accounts are securely stored and there is the right type of accountability around who is gaining the access. After gaining it, how they're using it, where they're using it, etc."
"The best aspect of the product is the ability to onboard devices. You can scan the IP subnets and onboard all the devices. You can then segregate them if it's a network device or a firewall. If it's a Windows server or a UNIX, you can basically scan your IT infrastructure and onboard the efforts, which should be managed. Once they have been onboarded, then the session management and password management are easy and nicely configurable."
"BeyondTrust Password Safe has good reporting and Smart Rules which makes it convenient. Though Smart Rules are convenient, those who do not have much experience with such things may find it difficult to understand how these things work. Otherwise, I find Smart Rules very convenient to work with."
"Its number one feature is discovery. The discovery engine in BeyondTrust is off the charts. When they perform a discovery, you know everything there is about a server, including what software is installed. For example, if you want to group all of your database servers together, you can do that by using discovery and Smart Rules. If a server has Microsoft SQL installed, it gets put into a group based on a Smart Rule. It makes it very easy to determine what is what in your environment. As organizations grow or acquire other companies and merge, they lose track of what they have. BeyondTrust can help you throw a rope around it very rapidly."
"The product has improved security and login due to the system recordings. In case, there is a doubt that someone has done something which they shouldn't have been doing, we can just go back and check what the user actually did."
"The main benefit of the solution is that it's very easy to set up. It only takes a couple of hours to install everything."
"Session recording and password management are the two main aspects."
"it's perfect to control and administer computers in our company."
"I think that Fudo Privileged Access Management is a very good program."
"This is a solution that I recommend because it is a simple privileged access management system that is done very well."
"We are convinced that Fudo PAM is better than competing products like WALLIX."
"Right now we are encouraging our customers to use Fudo PAM because it is the only product in PAM technology that we have to offer them."
"Fudo PAM was the most flexible and intuitive interface out of all of the products in the PAM sector."
 

Cons

"The integration with Secure Remote Access must be improved."
"I have faced stability issues when upgrading BeyondTrust Password Safe solution. The upgrade process can be lengthy compared to other modules."
"Adding user behavior analysis to the server or messaging would be beneficial."
"If they can create a single platform to create a connector, it would be better than using the RBS server."
"Named accounts don't work well in this solution. If you use named accounts for your administrative access, the way Smart Rules work is that it takes your SAM account name and matches it to the account name of your privileged ID, which creates limitations on size and how big those names can be because the directory has a 20-character limit."
"The only feature they could improve is the banners because they aren't informative."
"The effectiveness of BeyondTrust Password Safe's session management capabilities for SSH and RDP is pretty much robust, but it needs more improvement for other applications and web-based applications."
"The initial server implementation tasks could be easier to process."
"To tell you the truth, I find that Fudo is not very stable and we had some issues during the implementation."
"The stability is not very good."
"Fudo PAM’s scalability is not very strong."
"Professional training and certification would be great."
"The configuration is difficult."
"Professional training and certification would be great."
"The configuration is difficult."
"I would like to see better server management. You have to know exactly what you're looking for to get the right server."
 

Pricing and Cost Advice

"I would rate the pricing a seven out of ten, where one is cheap and ten is expensive."
"We just pay for Password Safe. Session management is included, but we don't use it. There aren't any additional costs besides the standard licensing fees. We pay for an annual license."
"The pricing structure is better than the competitors. It's much cheaper than CyberArk. They do the licensing on the basis of assets, not on the number of users. For CyberArk, they base the licensing on the number of users, and they have an expensive model of pricing. BeyondTrust has a cheaper model."
"When you buy Password Safe and perform your initial Discovery, you have all these servers that are added to your assets in BeyondTrust, but you're not using a license until you actually start managing the systems. BeyondTrust's licensing is based on the systems when they're managed, which means when an administrator is able to connect to the server through BeyondTrust with a managed account. There would be a privileged account on the endpoint when the licensing starts. A significant advantage to that is that there are many organizations that want to evaluate their environment prior to automatic management."
"The product is quite affordable."
"It has subscription-based licensing. BeyondTrust is three times less expensive than CyberArk."
"This solution is not cheap—it's a very expensive solution. Very, very expensive compared to the features and functions that they offer."
"At the time, BeyondTrust was significantly cheaper than CyberArk. Pricing-wise, if I remember correctly, it goes by assets. The pricing was negotiated for our instances based on the number of assets that we onboard into the system. It is a little different from CyberArk, where the pricing is by users. So, it depends. If you have a lot of assets, it can get very expensive."
"The pricing is great. We've been given discounts that make it cheaper than using any other solution."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
26%
Manufacturing Company
9%
Healthcare Company
6%
Computer Software Company
6%
Comms Service Provider
13%
Government
13%
Financial Services Firm
10%
Computer Software Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business13
Midsize Enterprise5
Large Enterprise10
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for BeyondTrust Password Safe?
My experience with BeyondTrust Password Safe's pricing, setup cost, and licensing has been positive, primarily due to its asset-based licensing model. This is a significant advantage for us because...
What needs improvement with BeyondTrust Password Safe?
I have faced stability issues when upgrading BeyondTrust Password Safe solution. The upgrade process can be lengthy compared to other modules. For example, upgrading the appliance and reconfiguring...
What is your primary use case for BeyondTrust Password Safe?
I am working on both BeyondTrust Password Safe and the PRA (Privileged Remote Access). I have three years plus experience working with BeyondTrust Password Safe solution, and I have hands-on, good ...
Ask a question
Earn 20 points
 

Also Known As

BeyondTrust PowerBroker Password Safe
Fudo Privileged Access Management
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL
Find out what your peers are saying about BeyondTrust Password Safe vs. Fudo PAM and other solutions. Updated: April 2026.
893,244 professionals have used our research since 2012.