Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.8
Organizations maximize BeyondTrust for compliance, integrating it within zero-trust frameworks to meet standards and enhance security.
Sentiment score
7.1
CyberArk Privileged Access Manager enhances security, streamlines workflows, and reduces risks and costs for managing privileged accounts in organizations.
During our quantitative analysis, we estimated potential savings of one to ten million dollars a year by using a PAM solution.
 

Customer Service

Sentiment score
7.1
BeyondTrust Endpoint Privilege Management offers skilled support with some delays, particularly outside U.S. hours, yet generally efficient service.
Sentiment score
6.5
CyberArk Privileged Access Manager's support is competent and improving, but faces challenges in response times and initial escalation processes.
Support is critical, especially when challenges arise related to PAM.
CyberArk has been exceptional in coming back to us with immediate responses.
They are helpful, but complex issues can take a long time to resolve, which can delay solutions for urgent customer issues.
Response times seem to correlate with the strength of the relationship with the CyberArk account manager, with quicker responses when rapport is strong.
 

Scalability Issues

Sentiment score
7.4
BeyondTrust Endpoint Privilege Management is scalable, reliable, and adaptable for diverse organizational needs, supporting large infrastructures seamlessly.
Sentiment score
7.7
CyberArk Privileged Access Manager efficiently scales across environments, with a modular architecture and streamlined cloud flexibility enhancing adaptability.
The initial understanding of the environment is crucial, followed by a simple deployment process.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
I would rate it a nine out of ten for scalability.
 

Stability Issues

Sentiment score
7.5
BeyondTrust Endpoint Privilege Management is stable, reliable, with minimal issues, praised for driver compatibility and cloud deployment stability.
Sentiment score
7.8
CyberArk Privileged Access Manager is stable and reliable, with manageable issues, strong support, and effective version upgrades.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
 

Room For Improvement

BeyondTrust requires UI and reporting enhancements, better integration, more updates, improved navigation, lower cost, and increased support responsiveness.
CyberArk needs user interface, integration, support, and feature enhancements, focusing on usability, costs, documentation, and advanced automation options.
The ability to view recorded live sessions of specific users is a crucial benefit.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
 

Setup Cost

BeyondTrust Endpoint Privilege Management's pricing is flexible but often viewed as high, especially for Mac clients compared to competitors.
CyberArk Privileged Access Manager is costly but valued for robust security features, ideal for mid to large-size enterprises.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
 

Valuable Features

BeyondTrust Endpoint manages privileges and vulnerabilities, enhancing security, compliance, and operational control with integration and efficiency across platforms.
CyberArk Privileged Access Manager excels in password rotation, session management, and seamless integration, offering advanced security and customization.
Administrators need a tool that provides visibility and clarity about endpoint management within the organization.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
As a security professional, I have real-time visibility into ongoing sessions.
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Ranking in Privileged Access Management (PAM)
9th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
29
Ranking in other categories
Anti-Malware Tools (12th)
CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
203
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of January 2025, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Endpoint Privilege Management is 4.5%, down from 6.0% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 20.5%, down from 23.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Prashant Uppuluri - PeerSpot reviewer
Provides critical application control and ensures security with a flexible setup process
Regarding the feedback scenario, it's a tough question as I have thoroughly gone through the entire partner portal and library of BeyondTrust, as well as BeyondTrust University. I have also interacted with support whenever a ticket is raised, ranging from P1 to P3 or P2. Most end users and partners seem happy and content with BeyondTrust. The deployment of the solution is generally easy, flexible, and scalable. However, it can be challenging in certain environments, especially regarding management. Improvements could focus on adding more AI features to automate processes that are currently manual or challenging for end users. In some cases of competition, I have noted specific use cases where the recording of sessions was an endpoint for BeyondTrust, providing an edge for higher management. The ability to view recorded live sessions of specific users is a crucial benefit.
Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
831,158 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
14%
Manufacturing Company
10%
Government
8%
Educational Organization
33%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360. While ManageEngine PAM360 offers similar flexibility and support at...
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Rockwell Automation
Find out what your peers are saying about BeyondTrust Endpoint Privilege Management vs. CyberArk Privileged Access Manager and other solutions. Updated: January 2025.
831,158 professionals have used our research since 2012.