Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs ForgeRock comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Average Rating
8.0
Number of Reviews
28
Ranking in other categories
Privileged Access Management (PAM) (4th), Anti-Malware Tools (10th)
ForgeRock
Average Rating
8.0
Number of Reviews
30
Ranking in other categories
Identity Management (IM) (10th), Access Management (6th), Customer Identity and Access Management (CIAM) (4th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. BeyondTrust Endpoint Privilege Management is designed for Privileged Access Management (PAM) and holds a mindshare of 4.6%, down 6.1% compared to last year.
ForgeRock, on the other hand, focuses on Access Management, holds 6.9% mindshare, up 6.4% since last year.
Privileged Access Management (PAM)
Access Management
 

Featured Reviews

Marlin B Pohlman - PeerSpot reviewer
Oct 24, 2022
Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us
The most important factor is the ability to invoke least privilege, which is required under 27701 and GDPR. We have used the solution to remove users' administrative rights and instead provide on-demand, token-based administrative rights. The latter is an option for a single, temporary increase in privileges for a trusted user for a specific time. We use it in a medical environment for HIPAA compliance or medical compliance in a GDPR case. For example, if you have a clinician who needs access to a specific piece of medical information, or if there is an administrator who needs to have administrator rights to a particular database for a limited period of time, we can give it and then revoke it. That's another reason the tool is useful. Also, the fact that we are able to add events straight from event logs and/or the database is important for crisis management and rapid reaction. This ability helps us meet our SLA requirements. In addition, we can elevate approved applications and actions without broad administrative rights. We can temporarily increase privilege based on tasks. If someone puts in a ticket, we increase their privilege for that ticket. We then watch to see if that ticket has been resolved and then we decrease it. Another feature of the platform is instant risk reduction solutions. We can do a risk metric with it, and we do that as part of our risk evaluation. We can increase and decrease privilege and we can actually show that in the ISO 13485 risk metric. And it provides a single solution for managing endpoint security preferences. It does a good job of that.
Trisha Bhola - PeerSpot reviewer
Aug 18, 2022
It's easier to customize and maintain our code
I worked on two different projects based on ForgeRock, and both are automated deployments. One is a UI-based deployment. It's an automated process using some scripts. The deployments are done through Octopus, so it's also automated. We first deploy the essential components of AM and then implement additional configurations like Amster Imports. After that, we import all the SAML Federation data and add some certificates. We have two teams of five and three team members working on the different deployment processes. One is working on the dev side, another is looking at the higher environment, and one is managing the data. In another project, I'm the only developer. We also deploy on the dev environments so that anyone can test new features, configurations, and client requirements. They can test it on the dev environment, but a team of four people manages higher environments. The Access Management component involves the most customization, which takes around 15 to 20 minutes because of the need to import the Amster configuration. If another deployment is simultaneously happening, it may be a little slower and take around 30 minutes. The other components, like the user data stores, take about five to seven minutes. It's another five to 10 minutes for Identity Management. After deployment, the maintenance is mostly checking for security vulnerabilities. If ForgeRock shares security vulnerabilities or advisories, we check to see if there is something inside we need to maintain. Other than that, we just install updates when they add features each month.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Reduces major vulnerabilities by removing local administrator privileges."
"The tool is easy to use and deploy. It has PAM capabilities like privilege access. The solution helps with the management of third parties and vendors. It is an effective solution compared to other alternatives."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"I like the intelligent authentication feature."
"In terms of the tool's operational efficiency, ForgeRock Access Management is used in a lot of environments, different regions, and in different stages of production environments."
"The product is easy to use in a development environment."
"Even though we have very small business interests with them today, they see that we plan on growing drastically over the next two years. Therefore, we have excellent support and we are now at a point where we are not calling tech support. We pick up a phone and call the Account Manager and they'll get everything resolved for us. We don't have to queue along with everybody else and go through a long process."
"It works very well, especially in Identity and Access Management. It helps detect anomalies in user behavior patterns."
"The product is easy to set up."
"The solution's most valuable feature is the authentication for the consumers. The integration with other third-party applications is excellent."
"ForgeRock is an extensive product with many functionalities and capabilities, much more than many other tools combined."
 

Cons

"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"Their technical support could be more responsive and helpful."
"It only has limited support for Mac."
"We faced some challenges with remote desktop sessions."
"Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful."
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
"They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment."
"They should improve the solution by include reporting."
"The user interface could be improved as it is cumbersome and outdated. It doesn't have a responsive UI."
"In an upcoming release, the solution could improve by limiting the need to do customizations."
"The product's customization is a bit complicated."
"The solution's documentation is not very good, and they do not give more details."
"As with any complex software platform, there is a learning curve to using ForgeRock, and it may require specialized expertise to implement and manage effectively."
"I don't think ForgeRock directly supports integrations with Slack, making it an area where improvements are required."
"The solution could improve by adding more advertising and marketing."
 

Pricing and Cost Advice

"The product’s licensing is different for Windows, Linux, and Mac. The tool’s licensing is yearly."
"I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions."
"It is relatively more cost-effective compared to the competing product."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten."
"The solution's pricing is high."
"What BeyondTrust was providing was user-based licensing which was a great benefit from the client point of view. Recently, I don't know why, the licensing model has been changed, and that is the reason that they have lost a bit of their edge when it comes to the PAM, against our competition. The asset-based licensing, from the user's point of view, is not beneficial. The licensing should be based on the users. The greater the number of users, the greater will be the load and the greater the scalability problems. I presume that is why the licensing model has changed."
"This solution is expensive compared to its competitors."
"Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
"The pricing of the solution is fair but I do not have the full details."
"It's a bit pricey and could be more competitive."
"We have multiple clients we are looking at right now. We are at a very small number, however, the idea and the goal is to grow. We are looking at about $100,000 and $50,000 a minimum a month cost. That'd be minimum maybe in a couple of years."
"Its licensing is on a yearly basis, but it also depends on the contract that you have with the vendor. They have multiple types of contracts. There are additional costs to the standard licensing fees. If you need some of the features, you have to pay more."
"Its price is comparable to other products in the market."
"The license is purchased annually per user. However, you can negotiate if you are signing for a longer period of time. When comparing this solution to others on the market it is priced fair, it is not at the top of the price range or at the bottom end."
"ForgeRock's pricing is more competitive than other products."
"ForgeRock is an expensive solution."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
813,418 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
13%
Manufacturing Company
10%
Government
8%
Financial Services Firm
23%
Computer Software Company
13%
Government
7%
Insurance Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What do you like most about ForgeRock?
The most valuable features of ForgeRock are social login and data protection.
What is your experience regarding pricing and costs for ForgeRock?
Our company was considering switching back to Keycloak from ForgeRock, so as to not pay any license fees. ForgeRock also supports M-PIN and biometric features that Keycloak does not provide. My com...
What needs improvement with ForgeRock?
In the past, I saw that Splunk was integrated with a testing portal, and then it was integrated with Slack. I don't think ForgeRock directly supports integrations with Slack, making it an area wher...
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
ForgeRock Identity Platform, ForgeRock OpenIDM
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Geico, Thomson Reuters, Salesforce, McKesson, Trinet, SKY, BNP Paribas, Deloitte, Capgemini, North Western University
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: October 2024.
813,418 professionals have used our research since 2012.