Try our new research platform with insights from 80,000+ expert users
BeyondTrust Endpoint Privilege Management Logo

BeyondTrust Endpoint Privilege Management Reviews

Vendor: BeyondTrust
4.0 out of 5
2,261 followers
Start review

What is BeyondTrust Endpoint Privilege Management?

Featured BeyondTrust Endpoint Privilege Management reviews

BeyondTrust Endpoint Privilege Management mindshare

Product category:
As of March 2025, the mindshare of BeyondTrust Endpoint Privilege Management in the Privileged Access Management (PAM) category stands at 3.9%, down from 5.6% compared to the previous year, according to calculations based on PeerSpot user engagement data.
Privileged Access Management (PAM)

PeerAnalyst reports based on BeyondTrust Endpoint Privilege Management reviews

TypeTitleDate
CategoryPrivileged Access Management (PAM)Mar 30, 2025Download
ProductReviews, tips, and advice from real usersMar 30, 2025Download
ComparisonBeyondTrust Endpoint Privilege Management vs CyberArk Privileged Access ManagerMar 30, 2025Download
ComparisonBeyondTrust Endpoint Privilege Management vs Delinea Secret ServerMar 30, 2025Download
ComparisonBeyondTrust Endpoint Privilege Management vs One Identity SafeguardMar 30, 2025Download
Suggested products
TitleRatingMindshareRecommending
CyberArk Privileged Access Manager4.319.4%94%217 interviewsAdd to research
Saviynt3.73.9%78%24 interviewsAdd to research
 
 
Key learnings from peers

Valuable Features

Room for Improvement

ROI

Pricing

Popular Use Cases

Service and Support

Deployment

Scalability

Stability

Review data by company size

By reviewers
By visitors reading reviews

Top industries

By visitors reading reviews
Financial Services Firm
18%
Computer Software Company
14%
Manufacturing Company
10%
Government
8%
Healthcare Company
5%
Educational Organization
4%
Energy/Utilities Company
4%
Real Estate/Law Firm
4%
University
3%
Comms Service Provider
3%
Insurance Company
3%
Construction Company
3%
Retailer
3%
Non Profit
2%
Outsourcing Company
2%
Hospitality Company
2%
Legal Firm
1%
Transportation Company
1%
Wholesaler/Distributor
1%
Pharma/Biotech Company
1%
Media Company
1%
Performing Arts
1%
Logistics Company
1%
Consumer Goods Company
1%
Aerospace/Defense Firm
1%
Recreational Facilities/Services Company
1%

Compare BeyondTrust Endpoint Privilege Management with alternative products

Learn more about BeyondTrust Endpoint Privilege Management

BeyondTrust Endpoint Privilege Management customers

Related questions

 

BeyondTrust Endpoint Privilege Management reviews

Sort by:
Prashant Uppuluri - PeerSpot user
Solution Architect at FVC
Verified user of BeyondTrust Endpoint Privilege Management
Jan 15, 2025
Provides critical application control and ensures security with a flexible setup process

Pros

"Administrators need a tool that provides visibility and clarity about endpoint management within the organization. This addresses the issue of managing privileged users, which is crucial for any administrator or higher management team to control. "

Cons

"Improvements could focus on adding more AI features to automate processes that are currently manual or challenging for end users."
Marlin B Pohlman - PeerSpot user
Consultant at Visdom
Verified user of BeyondTrust Endpoint Privilege Management
Nov 15, 2022
Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us

Pros

"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."

Cons

"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product. "
Find out what your peers are saying about BeyondTrust Endpoint Privilege Management. Updated March 2025
842,672 professionals have used our research since 2012.
PeerSpot user
Sr. Manager Cyber Security at a manufacturing company with 10,001+ employees
Verified user of BeyondTrust Endpoint Privilege Management
Feb 22, 2022
A simple and flexible solution for controlling the access and improving the security posture

Pros

"The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us."

Cons

"Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful."
Muhammad Baber - PeerSpot user
System Administrator at Alghanim Industries
Verified user of BeyondTrust Endpoint Privilege Management
May 21, 2024
Provides stable and secure remote access to assets in the organization

Pros

"The product is secure."

Cons

"We faced some challenges with remote desktop sessions."
PeerSpot user
Senior Specialist at a tech services company with 10,001+ employees
Verified user of BeyondTrust Endpoint Privilege Management
Nov 30, 2022
Improves security and provides the flexibility to meet the needs of users for application installation

Pros

"Logs that get collected on the Privilege Management console from the agents are very good. They help us to identify the aspects from which we have to whitelist an application."

Cons

"It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then. "
PeerSpot user
Software Consultant at a financial services firm with 5,001-10,000 employees
Verified user of BeyondTrust Endpoint Privilege Management
Apr 7, 2023
Good user management and command control features

Pros

"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."

Cons

"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
Mohammed-Talukdar - PeerSpot user
Lead Cyber Security Architect at a tech services company with 10,001+ employees
Verified user of BeyondTrust Endpoint Privilege Management
Sep 24, 2023
Provides stable performance and integration capabilities with various applications and the Windows operating system.

Pros

"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system. "

Cons

"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months. "
Pradeep Swain - PeerSpot user
Information Technology System Analyst at a tech services company with 1,001-5,000 employees
Verified user of BeyondTrust Endpoint Privilege Management
Jun 12, 2023
Valuable for coding activities and highly scalable solution

Pros

"Scalability is good. I would rate the scalability a nine out of ten. "

Cons

"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult. "