Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs BeyondTrust Password Safe comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.9
BeyondTrust Endpoint Privilege Management boosts ROI by enhancing security and compliance, supporting zero-trust adoption and marketplace participation.
Sentiment score
7.0
BeyondTrust Password Safe offered swift ROI and enhanced security, reducing audit challenges and ensuring cost-efficient compliance for organizations.
 

Customer Service

Sentiment score
7.1
Mixed reviews for BeyondTrust support, citing knowledgeable help but variable response times and lack of local Australian assistance.
Sentiment score
6.7
Customers appreciate BeyondTrust Password Safe's responsive customer service, though some desire better documentation and slight response time improvements.
The technical support from BeyondTrust responds very shortly whenever a ticket is created.
 

Scalability Issues

Sentiment score
7.4
BeyondTrust Endpoint Privilege Management offers exceptional scalability, effectively supporting large user bases with minimal performance impact and high stability.
Sentiment score
7.6
BeyondTrust Password Safe is praised for scalability, easy integration, and high user capacity across diverse environments and domains.
 

Stability Issues

Sentiment score
7.5
BeyondTrust Endpoint Privilege Management is mostly stable, with occasional minor bugs, quickly resolved issues, and an eight out of ten rating.
Sentiment score
7.5
BeyondTrust Password Safe is reliable and stable, but some setups experience issues requiring significant management and careful configuration.
 

Room For Improvement

BeyondTrust Endpoint Privilege Management needs UI, integration, reporting, compatibility, pricing improvements, and enhanced support and user guidance.
Users seek improved documentation, deployment, integration, UI, error handling, support, API, performance, scalability, and cost reduction for BeyondTrust Password Safe.
This would help in identifying suspicious activities immediately when users log in.
 

Setup Cost

BeyondTrust offers flexible licensing with varying costs, seen as both expensive and valuable, especially for Mac clients.
BeyondTrust Password Safe offers competitive, cost-effective pricing, appealing to enterprises for affordability and value with lower total ownership costs.
The pricing model is more affordable with the option of going for either unlimited devices or users.
 

Valuable Features

BeyondTrust Endpoint Privilege Management enhances security with privilege control, risk reduction, and integration capabilities for efficient endpoint security management.
BeyondTrust Password Safe offers intuitive management with automated onboarding, session recording, and seamless integration for enhanced auditing and availability.
The flexibility of the licensing model is significantly better as it offers both unlimited users and unlimited devices, unlike Delinea, which is based on the number of users.
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Ranking in Privileged Access Management (PAM)
4th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
28
Ranking in other categories
Anti-Malware Tools (10th)
BeyondTrust Password Safe
Ranking in Privileged Access Management (PAM)
8th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
22
Ranking in other categories
Enterprise Password Managers (6th)
 

Mindshare comparison

As of December 2024, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Endpoint Privilege Management is 4.5%, down from 6.0% compared to the previous year. The mindshare of BeyondTrust Password Safe is 3.2%, up from 2.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Marlin B Pohlman - PeerSpot reviewer
Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us
The most important factor is the ability to invoke least privilege, which is required under 27701 and GDPR. We have used the solution to remove users' administrative rights and instead provide on-demand, token-based administrative rights. The latter is an option for a single, temporary increase in privileges for a trusted user for a specific time. We use it in a medical environment for HIPAA compliance or medical compliance in a GDPR case. For example, if you have a clinician who needs access to a specific piece of medical information, or if there is an administrator who needs to have administrator rights to a particular database for a limited period of time, we can give it and then revoke it. That's another reason the tool is useful. Also, the fact that we are able to add events straight from event logs and/or the database is important for crisis management and rapid reaction. This ability helps us meet our SLA requirements. In addition, we can elevate approved applications and actions without broad administrative rights. We can temporarily increase privilege based on tasks. If someone puts in a ticket, we increase their privilege for that ticket. We then watch to see if that ticket has been resolved and then we decrease it. Another feature of the platform is instant risk reduction solutions. We can do a risk metric with it, and we do that as part of our risk evaluation. We can increase and decrease privilege and we can actually show that in the ISO 13485 risk metric. And it provides a single solution for managing endpoint security preferences. It does a good job of that.
Vinay Dabas - PeerSpot reviewer
Allows us to automatically rotate passwords, set the complexity, and enforce password policies on privileged accounts
The database instance onboarding should be simplified. The problem is that you can scan the assets and databases inside a server, but you cannot onboard them or manage them with the smart tools. It has to be done manually. I think they should try to include more custom platforms. With the databases, there were some issues. The databases are inside the servers, and it was a bit difficult to scan the databases. Apart from that, the rest of the assets were easy to scan and integrate. It's difficult to onboard the database. You can scan and find them, but you have to onboard the databases manually. You cannot onboard databases using Smart Rules databases. Database instances are difficult to onboard and must be done manually. The applications should be more like in the SDK. They have good API support now.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
824,067 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
13%
Manufacturing Company
10%
Government
8%
Computer Software Company
16%
Financial Services Firm
15%
Government
8%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Password Safe?
The pricing model is more affordable with the option of going for either unlimited devices or users. It is cost-effective compared to other solutions.
What needs improvement with BeyondTrust Password Safe?
As of today, I haven't found any issues. Adding user behavior analysis to the server or messaging would be beneficial. This would help in identifying suspicious activities immediately when users lo...
What is your primary use case for BeyondTrust Password Safe?
Our customers are looking for a product that offers provisioning in their network, and for that reason, they choose BeyondTrust Password Safe.
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
BeyondTrust PowerBroker Password Safe
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Aera Energy LLC, Care New England, James Madison University
Find out what your peers are saying about BeyondTrust Endpoint Privilege Management vs. BeyondTrust Password Safe and other solutions. Updated: December 2024.
824,067 professionals have used our research since 2012.