Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
The tickets for minor issues have been resolved efficiently.
I found the technical support from BeyondTrust to be very good.
The technical support from BeyondTrust responds very shortly whenever a ticket is created.
If using the built-in database, it requires good knowledge in Microsoft SQL, which could complicate scalability.
In my experience, the scalability of BeyondTrust Password Safe is also a nine.
The solution is very stable.
This would help in identifying suspicious activities immediately when users log in.
There are limitations when accessing or creating connectors for each application.
I believe one improvement could be having the last used passwords appear more automatically whenever I check for passwords associated with a frequently used system.
Pricing is managed by a different team, however, I know it's less expensive than CyberArk Privilege Access.
It is cost-effective compared to other solutions.
The features I find valuable in Password Safe include password retention and management, session privilege monitoring, live monitoring and recording, and the use of PS automation scripts for creating connections.
The flexibility of the licensing model is significantly better as it offers both unlimited users and unlimited devices, unlike Delinea, which is based on the number of users.
The most valuable features of BeyondTrust Password Safe, in my opinion, are its ease of use and robust security management.
Axiad Conductor offers a user-friendly platform for managing multifactor authentication and credential lifecycle, supporting seamless transitions to cloud environments for enhanced security compliance and access control.
Axiad Conductor stands out with intuitive management of multifactor authentication systems, assertive device lifecycle management, and a managed cloud solution that streamlines operations. It promotes user self-service for credential updates, minimizing the need for extensive training. With the capability to handle large networks, it enhances efficiency while meeting contract demands. Addressing user suggestions, plans include interface design updates and Canadian hosting, although macOS's frequent updates pose integration challenges.
What are the principal features of Axiad Conductor?In diverse industries, Axiad Conductor is implemented to manage multifactor authentication and PKI elements like smart cards and YubiKeys. Organizations leverage it to ensure compliance, facilitate secure workforce access, and transition PKI systems to the cloud, handling substantial volumes of smart card and machine certificates with ease.
Beyond Trust Password Safe is an automated solution that combines password and privileged session management into a single platform. Password Safe delivers secure access control, auditing, alerting, recording, and monitoring.
This free and open-source password manager supports Windows and Linux, and some ports are available for other platforms as well. Their proprietary algorithm, Twofish, is considered highly secure, with the advantage that it is not affiliated with NIST. The Twofish algorithm secures the data while keys are delivered using SHA-256 authentication.
The application is easy to use, and you can download the Windows app from several sites. Additionally, the application is available in 14 languages.
Beyond Trust Password Safe Key Features
What can you do with Password Safe?
Beyond Trust Password Safe Benefits
Reviews from Real Users
A PAM Architect at a tech services company says, "BeyondTrust Password Safe's features that I have found most valuable are really those that are knitted in. That is their Smart Rules and Smart Groups, where you design your administration model so you create your AD groups and your asset groups, and configure Password Safe."
An I.S. Architect at a insurance company mentions that "Session recording, password rotation, and password vaulting are the most valuable features."
"One of the most valuable features is that this is a product designed with enterprises in mind," adds a Cybersecurity Architect at a tech vendor.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.