Try our new research platform with insights from 80,000+ expert users

ARCON Privileged Access Management vs BeyondTrust Endpoint Privilege Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ARCON Privileged Access Man...
Ranking in Privileged Access Management (PAM)
5th
Average Rating
7.8
Reviews Sentiment
7.5
Number of Reviews
35
Ranking in other categories
No ranking in other categories
BeyondTrust Endpoint Privil...
Ranking in Privileged Access Management (PAM)
9th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
29
Ranking in other categories
Anti-Malware Tools (10th)
 

Mindshare comparison

As of April 2025, in the Privileged Access Management (PAM) category, the mindshare of ARCON Privileged Access Management is 3.6%, down from 4.5% compared to the previous year. The mindshare of BeyondTrust Endpoint Privilege Management is 3.9%, down from 5.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

PRAVINKHISMATRAO - PeerSpot reviewer
Enhanced compliance and security through detailed action recordings
We have used ARCON Privileged Access Management for recording videos of user actions taken after logging into systems. Around thirty people, including network engineers, server engineers, and application engineers, use it in the company There hasn't been a notable financial benefit for our…
Prashant Uppuluri - PeerSpot reviewer
Provides critical application control and ensures security with a flexible setup process
Regarding the feedback scenario, it's a tough question as I have thoroughly gone through the entire partner portal and library of BeyondTrust, as well as BeyondTrust University. I have also interacted with support whenever a ticket is raised, ranging from P1 to P3 or P2. Most end users and partners seem happy and content with BeyondTrust. The deployment of the solution is generally easy, flexible, and scalable. However, it can be challenging in certain environments, especially regarding management. Improvements could focus on adding more AI features to automate processes that are currently manual or challenging for end users. In some cases of competition, I have noted specific use cases where the recording of sessions was an endpoint for BeyondTrust, providing an edge for higher management. The ability to view recorded live sessions of specific users is a crucial benefit.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"After storing the administrator password in this password vault of the solution, the solution can automatically go and change the password based on the defined frequency with the defined complexity."
"The deployment process for the solution was easy...The solution's technical support team was good."
"The most valuable feature of ARCON Privileged Access Management is the recording of sessions. It has all the basic features we need to fulfill our use case."
"Recording all videos of commands entered into devices is highly valuable."
"They don't just stick to a base version; instead, they actively enhance and improve it based on client feedback and industry trends."
"The best part of this product is the administrator convenience. The portal is very user-friendly. An administrator can use it very easily."
"It is recording video records for Windows and command-line reports for others, Linux and AIX, of whatever activities being carries by that particular administrator."
"The initial setup is very straightforward. It's not complex at all."
"What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"The tool is easy to use and deploy. It has PAM capabilities like privilege access. The solution helps with the management of third parties and vendors. It is an effective solution compared to other alternatives."
"Logs that get collected on the Privilege Management console from the agents are very good. They help us to identify the aspects from which we have to whitelist an application."
 

Cons

"It would be helpful to have a "Favorites" list. For example, if I have 100 servers but I only go to 10 servers frequently, a Favorites list would allow me to go through those ten servers only."
"Sometimes it gets stuck between servers and I would like to see this improved in the future."
"The solution needs more work on the password management side of things. Password management is a big challenge for us, and I would like to improve this aspect. We're finding that BeyondTrust is better in this regard, which is why we're probably going to migrate over. It will offer better security I think."
"The deployment process is a bit complex because no document is available."
"I suggest implementing password rotation for service-based accounts, as that should be included."
"Managing users is difficult, so that is something that can be improved."
"I would like to see a "wild card" kind of a feature or something that would enable us to search the video."
"I'll provide feedback on additional features after the project is completed. I think it would be better to comment on that after the implementation is finished."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"It only has limited support for Mac."
"Its feature for establishing workflows needs improvement."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
 

Pricing and Cost Advice

"The licensing is simple, and there are only two types licensing: device licensing and user-based licensing."
"The product is available with competitive pricing. Licensing is not complex. We calculated the license requirements by counting the number of admins and the number of devices which were going to integrate with it."
"The pricing and licensing model is very economical."
"There are no major concerns with licensing because we can handle multiple servers in our kiosk system."
"The product's pricing is a good value. It's appropriately priced. The product has all the required features. It doesn't work in some of the areas but, right now overall, it's pretty good."
"It is good value for our business. According to me, their competitors are more costly. Therefore, it is quite affordable. I find the ARCON to be much cheaper than the other products in the market."
"Pricing and licensing are good, very aggressive."
"Their licensing model is very simple, as it is based on the number of endpoints which you want to manage along with the number of users and administrators which you want to use."
"What BeyondTrust was providing was user-based licensing which was a great benefit from the client point of view. Recently, I don't know why, the licensing model has been changed, and that is the reason that they have lost a bit of their edge when it comes to the PAM, against our competition. The asset-based licensing, from the user's point of view, is not beneficial. The licensing should be based on the users. The greater the number of users, the greater will be the load and the greater the scalability problems. I presume that is why the licensing model has changed."
"The solution's pricing is high."
"Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
"It is relatively more cost-effective compared to the competing product."
"The product’s licensing is different for Windows, Linux, and Mac. The tool’s licensing is yearly."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten."
"It was very expensive."
"Its pricing and licensing are okay. We were in the perpetual model when it was on-prem, and now, with the SaaS service, we have a subscription model. As a customer, I would always like to see a lower price, but it seems to be priced at the right model currently, and we are trying to get the maximum benefits out of it."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
845,040 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
62%
Computer Software Company
9%
Financial Services Firm
3%
Real Estate/Law Firm
2%
Financial Services Firm
18%
Computer Software Company
14%
Manufacturing Company
9%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with ARCON Privileged Access Management?
In terms of improvements, I suggest implementing password rotation for service-based accounts, as that should be included.
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
Setup costs vary depending on the scenario. Sometimes we win orders, and other times we lose due to partner preferences or deal scenarios. Customers may negotiate on price, understanding that quali...
 

Also Known As

ARCON ARCOS, ARCON PAM
BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
 

Overview

 

Sample Customers

RAK Bank, AXIS Bank, Reliance Capital, Kotak Life Insurance, MTS
Aera Energy LLC, Care New England, James Madison University
Find out what your peers are saying about ARCON Privileged Access Management vs. BeyondTrust Endpoint Privilege Management and other solutions. Updated: March 2025.
845,040 professionals have used our research since 2012.