Try our new research platform with insights from 80,000+ expert users

ARCON Privileged Access Management vs BeyondTrust Endpoint Privilege Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024
 

Categories and Ranking

ARCON Privileged Access Man...
Ranking in Privileged Access Management (PAM)
6th
Average Rating
7.8
Reviews Sentiment
7.5
Number of Reviews
35
Ranking in other categories
No ranking in other categories
BeyondTrust Endpoint Privil...
Ranking in Privileged Access Management (PAM)
4th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
28
Ranking in other categories
Anti-Malware Tools (10th)
 

Mindshare comparison

As of December 2024, in the Privileged Access Management (PAM) category, the mindshare of ARCON Privileged Access Management is 4.1%, down from 4.9% compared to the previous year. The mindshare of BeyondTrust Endpoint Privilege Management is 4.5%, down from 6.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

SarojMohapatra - PeerSpot reviewer
Offers good session monitoring and recording features
Some options are required in the tool, especially to help in scenarios where if a user's ID gets locked, that person cannot unlock the ID from ARCON Privileged Access Management. Even the technical team in my company cannot unlock any locked ID with the help of the tool. Even if there is an admin password, ARCON Privileged Access Management releases it using its functionalities, allowing users to generate a password during an emergency. If an ID gets locked, the tool cannot unlock it, making it an area where improvements are required.
Marlin B Pohlman - PeerSpot reviewer
Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us
The most important factor is the ability to invoke least privilege, which is required under 27701 and GDPR. We have used the solution to remove users' administrative rights and instead provide on-demand, token-based administrative rights. The latter is an option for a single, temporary increase in privileges for a trusted user for a specific time. We use it in a medical environment for HIPAA compliance or medical compliance in a GDPR case. For example, if you have a clinician who needs access to a specific piece of medical information, or if there is an administrator who needs to have administrator rights to a particular database for a limited period of time, we can give it and then revoke it. That's another reason the tool is useful. Also, the fact that we are able to add events straight from event logs and/or the database is important for crisis management and rapid reaction. This ability helps us meet our SLA requirements. In addition, we can elevate approved applications and actions without broad administrative rights. We can temporarily increase privilege based on tasks. If someone puts in a ticket, we increase their privilege for that ticket. We then watch to see if that ticket has been resolved and then we decrease it. Another feature of the platform is instant risk reduction solutions. We can do a risk metric with it, and we do that as part of our risk evaluation. We can increase and decrease privilege and we can actually show that in the ISO 13485 risk metric. And it provides a single solution for managing endpoint security preferences. It does a good job of that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The entire conversation that is happening between the servers and the client is recorded. It is a good feature if you want to do some analysis, and for investigation."
"Previously, we had to go through some effort to change the credentials of our devices. The process was subject to human error... For things like managing credentials, some kind of register had to be maintained. With the Password Vault of ARCON, all these processes are automated. The credentials are changed, as per the schedule. The information is encrypted, kept in our vault, and sent to all the email addresses within the ARCON solution itself."
"We use ARCON Privileged Access Management to monitor and record our admin users' activity."
"The most valuable feature is it is easy to use and the interface is intuitive."
"Logging, particularly screen recording for Windows RDP sessions. Also, command-logging for SSH sessions. This really helps us to see what commands/changes have been executed in a particular service at a given point of time, and by whom."
"The deployment process for the solution was easy...The solution's technical support team was good."
"The technical support is excellent."
"They don't just stick to a base version; instead, they actively enhance and improve it based on client feedback and industry trends."
"What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
"The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us."
"It scales easily and the product is stable."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"Technical support is good."
"Scalability is good. I would rate the scalability a nine out of ten."
"The product is secure."
 

Cons

"One common problem I faced with ARCON PAM was compatibility issues with certain software versions."
"Currently, along with the upgrade of the ARCON solution, we have to consider the desktops and the endpoints from where the solution will have to be accessed. We have to upgrade those endpoints and desktops as well. So upgrades are not smooth."
"I'd also suggest adding a browser isolation feature to prevent cache storage on endpoints and mitigate cache-based attacks."
"I would like for it to be dependent on Windows as opposed to Linux."
"The auto-password change feature which was recently added. It is supposed to change the password. However, in some cases, while changing the password, it has caused me to lose to connection due to network-related issues or something similar. What we need to have is a type of log for failure of password change."
"Sometimes it gets stuck between servers and I would like to see this improved in the future."
"They need to support all web browsers. At the moment it only supports Explorer, IE. They have to come up with a solution to support all browsers."
"The solution needs more work on the password management side of things. Password management is a big challenge for us, and I would like to improve this aspect. We're finding that BeyondTrust is better in this regard, which is why we're probably going to migrate over. It will offer better security I think."
"How the accounts are presented in the solution's UI can be improved."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"If you don't get the implementation right at the outset, you will struggle with the product."
"The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does."
"A valuable enhancement could be the capability to deploy agents directly through the console."
 

Pricing and Cost Advice

"The solution’s pricing is neither cheap nor expensive."
"The product's pricing is good value. Go for user-based licensing, without any limit on the target servers."
"The cost of this product is very cheap, comparatively in the global market."
"They do have some licenses, which are required for things like Linux servers. However, in my environment, we do not have Linux servers."
"There are no major concerns with licensing because we can handle multiple servers in our kiosk system."
"The product's pricing is a good value. It's appropriately priced. The product has all the required features. It doesn't work in some of the areas but, right now overall, it's pretty good."
"Pricing is low and licensing is flexible."
"ARCON Privileged Access Management's pricing is reasonable."
"What BeyondTrust was providing was user-based licensing which was a great benefit from the client point of view. Recently, I don't know why, the licensing model has been changed, and that is the reason that they have lost a bit of their edge when it comes to the PAM, against our competition. The asset-based licensing, from the user's point of view, is not beneficial. The licensing should be based on the users. The greater the number of users, the greater will be the load and the greater the scalability problems. I presume that is why the licensing model has changed."
"It was very expensive."
"PowerBroker for a Mac client is three times the price of the Windows version."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten."
"The product’s licensing is different for Windows, Linux, and Mac. The tool’s licensing is yearly."
"Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
"The solution's pricing is high."
"This solution is expensive compared to its competitors."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
824,067 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
64%
Computer Software Company
9%
Financial Services Firm
3%
Retailer
2%
Financial Services Firm
16%
Computer Software Company
13%
Manufacturing Company
10%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with ARCON Privileged Access Management?
In terms of improvements, I suggest implementing password rotation for service-based accounts, as that should be included.
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
 

Also Known As

ARCON ARCOS, ARCON PAM
BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
 

Learn More

 

Overview

 

Sample Customers

RAK Bank, AXIS Bank, Reliance Capital, Kotak Life Insurance, MTS
Aera Energy LLC, Care New England, James Madison University
Find out what your peers are saying about ARCON Privileged Access Management vs. BeyondTrust Endpoint Privilege Management and other solutions. Updated: December 2024.
824,067 professionals have used our research since 2012.