Try our new research platform with insights from 80,000+ expert users

ARCON Privileged Access Management vs BeyondTrust Endpoint Privilege Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024
 

Categories and Ranking

ARCON Privileged Access Man...
Ranking in Privileged Access Management (PAM)
8th
Average Rating
7.8
Reviews Sentiment
7.3
Number of Reviews
34
Ranking in other categories
No ranking in other categories
BeyondTrust Endpoint Privil...
Ranking in Privileged Access Management (PAM)
4th
Average Rating
8.0
Number of Reviews
28
Ranking in other categories
Anti-Malware Tools (9th)
 

Mindshare comparison

As of November 2024, in the Privileged Access Management (PAM) category, the mindshare of ARCON Privileged Access Management is 4.1%, down from 4.7% compared to the previous year. The mindshare of BeyondTrust Endpoint Privilege Management is 4.6%, down from 6.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

SarojMohapatra - PeerSpot reviewer
Mar 25, 2024
Offers good session monitoring and recording features
I use the solution in my company since the product is very good. In one of the use cases attached to the solution, I remember that an ID got locked after being unable to unlock the ID three or four times as per company policy. As per the organization's policy, if you try to run a password three or…
Marlin B Pohlman - PeerSpot reviewer
Oct 24, 2022
Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us
The most important factor is the ability to invoke least privilege, which is required under 27701 and GDPR. We have used the solution to remove users' administrative rights and instead provide on-demand, token-based administrative rights. The latter is an option for a single, temporary increase in privileges for a trusted user for a specific time. We use it in a medical environment for HIPAA compliance or medical compliance in a GDPR case. For example, if you have a clinician who needs access to a specific piece of medical information, or if there is an administrator who needs to have administrator rights to a particular database for a limited period of time, we can give it and then revoke it. That's another reason the tool is useful. Also, the fact that we are able to add events straight from event logs and/or the database is important for crisis management and rapid reaction. This ability helps us meet our SLA requirements. In addition, we can elevate approved applications and actions without broad administrative rights. We can temporarily increase privilege based on tasks. If someone puts in a ticket, we increase their privilege for that ticket. We then watch to see if that ticket has been resolved and then we decrease it. Another feature of the platform is instant risk reduction solutions. We can do a risk metric with it, and we do that as part of our risk evaluation. We can increase and decrease privilege and we can actually show that in the ISO 13485 risk metric. And it provides a single solution for managing endpoint security preferences. It does a good job of that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The deployment process for the solution was easy...The solution's technical support team was good."
"The session management capabilities are helpful. The session recording feature for system handling is good. It also eliminates the need to open many ports for end-users, simplifying access."
"We use ARCON Privileged Access Management to monitor and record our admin users' activity."
"It is recording video records for Windows and command-line reports for others, Linux and AIX, of whatever activities being carries by that particular administrator."
"By manually keeping the user logs, we can understand and manage all the operationalized tasks."
"With this log available, we can drill down to the activities performed by the people within our kiosk. There is a great feature where in the case of Unix servers, we have our own text-based logs. In the case of Window's server, we cannot create a text-based log, so our kiosk takes the screenshot or picture of the screen when I am working. It does this every three seconds."
"Session recording is the most valuable feature, as it covers compliance and it also covers our in-house applications."
"The video logs help us to identify any misuse of privileged accounts."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"Technical support is good."
"I find the solution’s features like section management, password management, and analytics valuable."
"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"The tool is easy to use and deploy. It has PAM capabilities like privilege access. The solution helps with the management of third parties and vendors. It is an effective solution compared to other alternatives."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
 

Cons

"The solution needs more work on the password management side of things. Password management is a big challenge for us, and I would like to improve this aspect. We're finding that BeyondTrust is better in this regard, which is why we're probably going to migrate over. It will offer better security I think."
"We expect improvement in the dashboards to provide visibility of password compliance status, whenever a password is opened from the vault. Also, flexibility to customize the live dashboard."
"If an ID gets locked, the tool cannot unlock it, making it an area where improvements are required."
"For the in-house built applications, they need to provide good, solid access through their portal."
"Initially, there were some issues with .NET applications in Windows 10 systems."
"A few areas for improvement in ARCON would be performance optimization, ensuring smoother management."
"It would be helpful to have a "Favorites" list. For example, if I have 100 servers but I only go to 10 servers frequently, a Favorites list would allow me to go through those ten servers only."
"Managing users is difficult, so that is something that can be improved."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment."
"Their technical support could be more responsive and helpful."
"Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"They need to come up with better integrative options which should be customer-centric."
"Its feature for establishing workflows needs improvement."
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
 

Pricing and Cost Advice

"It is good value for our business. According to me, their competitors are more costly. Therefore, it is quite affordable. I find the ARCON to be much cheaper than the other products in the market."
"The cost of this product is very cheap, comparatively in the global market."
"Their licensing model is very simple, as it is based on the number of endpoints which you want to manage along with the number of users and administrators which you want to use."
"The pricing and licensing model is very economical."
"The licensing is simple, and there are only two types licensing: device licensing and user-based licensing."
"The solution’s pricing is neither cheap nor expensive."
"The product's pricing is good value. Go for user-based licensing, without any limit on the target servers."
"The product is available with competitive pricing. Licensing is not complex. We calculated the license requirements by counting the number of admins and the number of devices which were going to integrate with it."
"This solution is expensive compared to its competitors."
"Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
"Its pricing and licensing are okay. We were in the perpetual model when it was on-prem, and now, with the SaaS service, we have a subscription model. As a customer, I would always like to see a lower price, but it seems to be priced at the right model currently, and we are trying to get the maximum benefits out of it."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten."
"The product’s licensing is different for Windows, Linux, and Mac. The tool’s licensing is yearly."
"It is relatively more cost-effective compared to the competing product."
"What BeyondTrust was providing was user-based licensing which was a great benefit from the client point of view. Recently, I don't know why, the licensing model has been changed, and that is the reason that they have lost a bit of their edge when it comes to the PAM, against our competition. The asset-based licensing, from the user's point of view, is not beneficial. The licensing should be based on the users. The greater the number of users, the greater will be the load and the greater the scalability problems. I presume that is why the licensing model has changed."
"The solution's pricing is high."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
814,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
62%
Computer Software Company
8%
Financial Services Firm
4%
Retailer
3%
Financial Services Firm
16%
Computer Software Company
13%
Manufacturing Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with ARCON Privileged Access Management?
The solution could be more stable as we've encountered bugs and issues. I'd also suggest adding a browser isolation feature to prevent cache storage on endpoints and mitigate cache-based attacks. T...
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
 

Also Known As

ARCON ARCOS, ARCON PAM
BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
 

Learn More

 

Overview

 

Sample Customers

RAK Bank, AXIS Bank, Reliance Capital, Kotak Life Insurance, MTS
Aera Energy LLC, Care New England, James Madison University
Find out what your peers are saying about ARCON Privileged Access Management vs. BeyondTrust Endpoint Privilege Management and other solutions. Updated: October 2024.
814,649 professionals have used our research since 2012.