BeyondTrust Endpoint Privilege Management vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Ranking in Privileged Access Management (PAM)
5th
Average Rating
8.0
Number of Reviews
28
Ranking in other categories
Anti-Malware Tools (12th)
CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.8
Number of Reviews
144
Ranking in other categories
User Activity Monitoring (1st)
 

Market share comparison

As of June 2024, in the Privileged Access Management (PAM) category, the market share of BeyondTrust Endpoint Privilege Management is 5.0% and it decreased by 22.2% compared to the previous year. The market share of CyberArk Privileged Access Manager is 22.3% and it decreased by 1.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
Unique Categories:
Anti-Malware Tools
2.2%
User Activity Monitoring
22.2%
 

Featured Reviews

OS
Jan 29, 2020
Good asset discovery and management capability
We are a technical services company and this is one of the solutions that we provide for our clients. It is used to manage privileged access for our customers and their server resources. One of our customers had administrators that shared credentials to access some of their enterprise applications…
Syed Javid - PeerSpot reviewer
Jan 25, 2022
Removes security threats and vulnerabilities from an organization in a secure way
When it comes to PAM, it is always about compliance. It has a feature that enables you to access the password in a very secure way using encryption. You also need multiple approvals. For example, if you have access to CyberArk, it doesn't mean that you have access to the server. So, whenever you try to access that server, a request will go to your manager. Once he approves the request, only then will you be able to access the server. These are a few of the features that I like about this solution. CyberArk PAM provides ease of access based on how they have designed it. It is clearly defined where you have to go and what you have to do. If you are an end user, it is very easy to use and provides a comfort level.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution's technical support is good."
"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"The product is secure."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us."
"The implementation is quite easy because the documents are always online."
"It has a centralized page where you can manage everything. This makes work easier. You don't have to remember different module URLs or browser applications. It is very easy to get all the secure identities of other environments into a single page, which is very important for us as it helps a lot in terms of operations, e.g., reduces management time. This is a single page where you can manage all accounts and onboard them to the CyberArk. You can then secure and see passwords from everywhere. So, there is a single pane of glass where you can manage all the identities across environments as well as across different types of identities."
"The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials."
"The technical support is good."
"The key aspects of privileged access management are being able rotate passwords, make sure someone is accountable, and tie it back to a user (when the system is being used)."
"The credentials management capability is key to ensuring that the credentials are kept secure and that access to them is done on a temporary and event-driven basis."
"On the customer accounts side, our account managers are responsive. If you ask them, they will get you whomever you need."
"It allows users to self-provision access to the accounts that they need."
"You can write different types of policies for custom business needs or any developer needs. If they need certain functions allocated, they can be customized easily."
 

Cons

"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment."
"They need to come up with better integrative options which should be customer-centric."
"How the accounts are presented in the solution's UI can be improved."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"The authentication port is available in CyberArk Alero but not Fortinet products."
"It needs better documentation with more examples for the configuration files and API/REST integration"
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"CyberArk PAM could greatly benefit from an under-the-hood update; integrating machine learning algorithms could provide predictive insights."
"I would like to see better usability for non-technical people."
"More than the product itself, there is room for improvement in the documentation. The documentation should be very detailed and very structured. It has a lot of good information, on one level, but I feel that it could be more elaborate and more structured."
"The lead product has a slow process. There are some reports and requirements from CyberArk which are not readily available as an applicable solution. We have made consistent management requests in the logs."
 

Pricing and Cost Advice

"This solution is expensive compared to its competitors."
"Its pricing and licensing are okay. We were in the perpetual model when it was on-prem, and now, with the SaaS service, we have a subscription model. As a customer, I would always like to see a lower price, but it seems to be priced at the right model currently, and we are trying to get the maximum benefits out of it."
"Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
"What BeyondTrust was providing was user-based licensing which was a great benefit from the client point of view. Recently, I don't know why, the licensing model has been changed, and that is the reason that they have lost a bit of their edge when it comes to the PAM, against our competition. The asset-based licensing, from the user's point of view, is not beneficial. The licensing should be based on the users. The greater the number of users, the greater will be the load and the greater the scalability problems. I presume that is why the licensing model has changed."
"It is relatively more cost-effective compared to the competing product."
"I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions."
"It was very expensive."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten."
"It's expensive, certainly. But CyberArk is the leader in the market with regards to privileged access management. You pay a lot, but you are paying for the value that is being delivered."
"CyberArk is one of the best PAM solutions and one of the most expensive, but it works better than the others, so the pricing is fair."
"I haven't seen the numbers. I know it is not cheap, but I don't know what it is. I would rate it a six out of ten in terms of pricing. It is definitely more expensive than the other product, but it also provides more functionality, and it is modular too. So, we pay for the functionality we're actually going to use, and that's nice."
"Before we bought it, they were licensing each function individually, which got complicated and very expensive. When we decided to buy it, it was much more straightforward and still quite expensive, but it brings a lot of value and risk reduction to the organization."
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
"The price of CyberArk Privileged Access Manager is expensive. There are no other fees other than the standard licensing fees."
"It is in line with its competitors, but all such solutions cost too much money."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
787,061 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
12%
Manufacturing Company
10%
Government
8%
Educational Organization
31%
Computer Software Company
12%
Financial Services Firm
11%
Manufacturing Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
CyberArk Privileged Access Security
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Rockwell Automation
Find out what your peers are saying about BeyondTrust Endpoint Privilege Management vs. CyberArk Privileged Access Manager and other solutions. Updated: May 2024.
787,061 professionals have used our research since 2012.