Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs CyberArk Endpoint Privilege Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.8
Organizations maximize BeyondTrust for compliance, integrating it within zero-trust frameworks to meet standards and enhance security.
Sentiment score
7.0
CyberArk Endpoint Privilege Manager enhances security and reduces costs, despite challenges in quantifying precise ROI, with immediate benefits.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
 

Customer Service

Sentiment score
7.1
BeyondTrust Endpoint Privilege Management offers skilled support with some delays, particularly outside U.S. hours, yet generally efficient service.
Sentiment score
6.4
CyberArk Endpoint Privilege Manager support varies; effectiveness depends on user experience, with inconsistent response times and complex contact methods.
Support is critical, especially when challenges arise related to PAM.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
At times, when we need quick support, I contact them via email or WhatsApp, and I have to wait for about an hour before finding a respondent.
 

Scalability Issues

Sentiment score
7.4
BeyondTrust Endpoint Privilege Management is scalable, reliable, and adaptable for diverse organizational needs, supporting large infrastructures seamlessly.
Sentiment score
7.7
CyberArk Endpoint Privilege Manager scales efficiently for small to massive deployments, supporting cloud and on-premise solutions with ease.
The initial understanding of the environment is crucial, followed by a simple deployment process.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
 

Stability Issues

Sentiment score
7.5
BeyondTrust Endpoint Privilege Management is stable, reliable, with minimal issues, praised for driver compatibility and cloud deployment stability.
Sentiment score
8.2
CyberArk Endpoint Privilege Manager is stable with high performance but occasionally experiences downtime during upgrades, especially on non-Windows systems.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
 

Room For Improvement

BeyondTrust requires UI and reporting enhancements, better integration, more updates, improved navigation, lower cost, and increased support responsiveness.
CyberArk Endpoint Privilege Manager needs user-friendly enhancements, better integration, faster support, pricing adjustments, and improved threat detection tools.
The ability to view recorded live sessions of specific users is a crucial benefit.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
 

Setup Cost

BeyondTrust Endpoint Privilege Management's pricing is flexible but often viewed as high, especially for Mac clients compared to competitors.
CyberArk Endpoint Privilege Manager is costly, especially for small businesses, with potential discounts for large enterprises.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
CyberArk has saved us 15% of our costs.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
 

Valuable Features

BeyondTrust Endpoint manages privileges and vulnerabilities, enhancing security, compliance, and operational control with integration and efficiency across platforms.
CyberArk Endpoint Privilege Manager ensures security and compliance through admin control, ransomware protection, and advanced credential analytics.
Administrators need a tool that provides visibility and clarity about endpoint management within the organization.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
The features I find most valuable are the endpoint privilege capabilities, which provide automatic protection to our IT environment.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Ranking in Privileged Access Management (PAM)
5th
Ranking in Anti-Malware Tools
9th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
29
Ranking in other categories
No ranking in other categories
CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
3rd
Ranking in Anti-Malware Tools
5th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
36
Ranking in other categories
Endpoint Compliance (4th), Application Control (5th), Ransomware Protection (6th)
 

Mindshare comparison

As of February 2025, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Endpoint Privilege Management is 4.2%, down from 5.5% compared to the previous year. The mindshare of CyberArk Endpoint Privilege Manager is 3.6%, up from 3.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Prashant Uppuluri - PeerSpot reviewer
Provides critical application control and ensures security with a flexible setup process
Regarding the feedback scenario, it's a tough question as I have thoroughly gone through the entire partner portal and library of BeyondTrust, as well as BeyondTrust University. I have also interacted with support whenever a ticket is raised, ranging from P1 to P3 or P2. Most end users and partners seem happy and content with BeyondTrust. The deployment of the solution is generally easy, flexible, and scalable. However, it can be challenging in certain environments, especially regarding management. Improvements could focus on adding more AI features to automate processes that are currently manual or challenging for end users. In some cases of competition, I have noted specific use cases where the recording of sessions was an endpoint for BeyondTrust, providing an edge for higher management. The ability to view recorded live sessions of specific users is a crucial benefit.
Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
838,640 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
14%
Manufacturing Company
10%
Government
8%
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
Setup costs vary depending on the scenario. Sometimes we win orders, and other times we lose due to partner preferences or deal scenarios. Customers may negotiate on price, understanding that quali...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
What needs improvement with CyberArk Endpoint Privilege Manager?
The CyberArk team is working on a feature to identify devices without the Endpoint Privilege Manager running, which is currently missing. Another enhancement needed is the scheduling of deployment,...
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
Viewfinity
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Information Not Available
Find out what your peers are saying about BeyondTrust Endpoint Privilege Management vs. CyberArk Endpoint Privilege Manager and other solutions. Updated: January 2025.
838,640 professionals have used our research since 2012.