Try our new research platform with insights from 80,000+ expert users
reviewer1093563 - PeerSpot reviewer
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
Reseller
Good asset discovery and management capability
Pros and Cons
  • "The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
  • "The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does."

What is our primary use case?

We are a technical services company and this is one of the solutions that we provide for our clients. It is used to manage privileged access for our customers and their server resources.

One of our customers had administrators that shared credentials to access some of their enterprise applications. We needed to remove those credentials because they were compromised at some point, leaving other people to access them and the organization was not able to keep track of who was logging in, or what they were doing at any particular point in time. Implementing this solution has allowed us to remove most of the credentials from those applications move them into a proper management facility.

What is most valuable?

The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager.

What needs improvement?

The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does. This would help because sometimes, you can get lost and you find yourself going back to see what the functions do. Have at least a very small hint for some of the key functions would go a long way to help with deploying and using the system.

Better pricing would help this solution to grow in the Nigerian market.

For how long have I used the solution?

I have been using BeyondTrust Endpoint Privilege Management for just less than three years.

Buyer's Guide
BeyondTrust Endpoint Privilege Management
November 2024
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.

What do I think about the stability of the solution?

This is a stable solution.

What do I think about the scalability of the solution?

Our customers have been relying on what they have, and thus there has been no reason to scale.

How are customer service and support?

We have been in touch with technical support and we are satisfied with them.

Which solution did I use previously and why did I switch?

We offer a variety of competing solutions to our clients, such as CyberArk. In general, the competitors are cheaper in price. I have not personally used other solutions because it was BeyondTrust that brought me into the privileged access management realm.

How was the initial setup?

The initial setup is a bit complex and not particularly straightforward. Deploying this solution for the first time took about a month.

What about the implementation team?

Our in-house team handled the deployment.

What's my experience with pricing, setup cost, and licensing?

This solution is expensive compared to its competitors.

What other advice do I have?

This is a good solution that I would recommend, but in the Nigerian market, the price of this solution is challenging. Many companies are choosing competing solutions like CyberArk because the cost is lower. If the price were more friendly then it would have a better share of the market.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
reviewer1093563 - PeerSpot reviewer
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
Reseller
Offers good stability and asset discovery makes it easy to pull assets into the database of the solution manager
Pros and Cons
  • "The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
  • "The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."

What is our primary use case?

At one point, our users shared credentials to access some enterprise applications within our environment. We had to take off user credentials because those credentials were getting compromised at one point. We also had trouble keeping track of who logged in or when people were doing work at any given period of time. With this solution, we're able to log the credentials from those applications and then move it into the facility for proper credential management.

What is most valuable?

The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager.

What needs improvement?

The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process.

For how long have I used the solution?

I've been using the solution for less than three years.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

I can't say how scalable the solution is because I don't have too much experience in the matter. For how we are currently using it, we haven't had a reason to scale the solution. Our customers would know better, but it's my sense that BeyondTrust offers much more access compared to a competitor like CyberArk.

Which solution did I use previously and why did I switch?

We didn't previously use a different solution.

How was the initial setup?

The initial process is not straightforward. It's a bit complex. Deployment took about a month for us.

What about the implementation team?

We handled the deployment in-house with the help of our own team.

What's my experience with pricing, setup cost, and licensing?

The pricing is quite high.

Which other solutions did I evaluate?

We didn't evaluate other options. We were already using BeyondTrust and it seemed a natural extension to add this solution as well.

What other advice do I have?

We're a BeyondTrust reseller.

I'd recommend the solution. However, the pricing is not competitive and I find in the Nigerian market we're losing ground to CyberArk because the pricing is so unfriendly for the region. They need to try and match their competitors here in order to stay competitive overall in the market.

I'd rate the solution eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
PeerSpot user
Buyer's Guide
BeyondTrust Endpoint Privilege Management
November 2024
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
Senior Technical Consultant at a tech services company with 1,001-5,000 employees
Real User
Simplifies server access without password distribution

How has it helped my organization?

Simplifies server access without password distribution.

What is most valuable?

Password management, as it is a core function; passwords are a frequent hacking point.

What needs improvement?

All products have room to improve. I would like to see support for many more systems, such as AS400.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

No issues with stability.

What do I think about the scalability of the solution?

I have not had a chance to scale out.

How is customer service and technical support?

My support has come from the sales engineering team, not the support team, and I would rate the support at nine out of 10.

How was the initial setup?

For a production environment, the setup is easy. For a PoC it is a different scenario.

What other advice do I have?

Take care regarding the SQL database.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1136769 - PeerSpot reviewer
Consultant- Information Security at a tech services company with 11-50 employees
Consultant
Monitors all infrastructure activities but program updates are very rare and it gets buggy
Pros and Cons
  • "The implementation is quite easy because the documents are always online."
  • "The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."

What is our primary use case?

Our primary use case of this solution is data access management. When you have a complex infrastructure you obviously need a solution that can monitor the activities that are going on in the infrastructure. The usernames, passwords, and activities have to be monitored, and this program helps you with that.

So it is nothing but a monitoring and security tool that will monitor all the infrastructure activities and help you to manage the passwords of the infrastructure so that the passwords are not being exposed to the third parties or your users. These passwords will be secure in your infrastructure and be rotated as part of the compliance policies.

What needs improvement?

There are a few points that are lagging in the technology and I think updated versions should be available more frequently.

So the program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features. 

For how long have I used the solution?

I have been working on BeyondTrust Endpoint Privilege Management for about three years now.

What do I think about the stability of the solution?

BeyondTrust is lagging on stability because it is a merger with Bomgar and so there are three, four technologies included in that. So the stability is still not how it should be.

What do I think about the scalability of the solution?

The program is scalable. It is reliable and to be deployed in a complex infrastructure, will be no problem. It can handle the load. Almost all our clients are enterprise level. So we have good partners and clients with enterprise architecture and complex infrastructure.

How was the initial setup?

The implementation is quite easy because the documents are always online. So you can do the installation yourself. But it is always better to have certified engineers to do the implementation so that you can design the infrastructure in a more secure way. When you have certified engineers, they have their own strategies to do the implementation, which is good in the long run. The deployment, however, is easy and very straightforward.

For a program like this, you want your infrastructure to be stable for more than five years or 10 years. So when you do the deployment with the help of certified engineers, they will have their own strategy of doing the installation and implementation so that managing the operations of such solutions will be easy for you. Yes, you can do the installation on your own, but it is always better to have some certified engineers.

What other advice do I have?

This program has a good reputation in the market and it is more required for the security of your infrastructure. It is a product that you can trust. The only thing I'm looking for in the next version is that the bug fixes have to be more frequent and the solution has to be more reliable and more flexible. On a scale from one to 10, I'll give it a six.

Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
Senior Technical Consultant at a tech services company with 1,001-5,000 employees
Real User
It scales easily and the product is stable
Pros and Cons
  • "It scales easily and the product is stable."
  • "It should support XWindows Remote Desktop Access protocol for Linux/Unix."

What is our primary use case?

We use it for the password management (of privileged password management).

What is most valuable?

Privileged password management.

What needs improvement?

It should support XWindows Remote Desktop Access Protocol for Linux/Unix.

I would like more connectors for other security software/systems. A password is needed to access their security systems.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

No stability issues.

What do I think about the scalability of the solution?

It scales easily.

How are customer service and technical support?

I would rate their technical support as a nine out of 10. I have a technical support contact in Singapore.

Which solution did I use previously and why did I switch?

We did not previously use another solution.

How was the initial setup?

The initial setup was easy.

What other advice do I have?

For a Windows/Linux/Unix mixed environment, it is a good product to management privilege account passwords to prevent security breaches.

Disclosure: My company has a business relationship with this vendor other than being a customer: Distributor.
PeerSpot user
Buyer's Guide
Download our free BeyondTrust Endpoint Privilege Management Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free BeyondTrust Endpoint Privilege Management Report and get advice and tips from experienced pros sharing their opinions.