

Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM).
| Product | Mindshare (%) |
|---|---|
| BeyondTrust Endpoint Privilege Management | 3.0% |
| CyberArk Privileged Access Manager | 10.5% |
| Delinea Secret Server | 4.5% |
| Other | 82.0% |
| Product | Mindshare (%) |
|---|---|
| IBM Security Identity Governance and Intelligence | 2.8% |
| SailPoint Identity Security Cloud | 20.1% |
| One Identity Manager | 10.1% |
| Other | 67.0% |

| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 3 |
| Large Enterprise | 15 |
BeyondTrust Endpoint Privilege Management offers enhanced security through asset discovery and privilege elevation without administrative rights, supporting seamless operations in complex environments.
BeyondTrust Endpoint Privilege Management combines advanced threat detection with powerful tools like application control and session management. It is designed to secure IT infrastructures by removing local admin privileges and facilitating remote application publishing. With integration capabilities and robust compliance support, it is suitable for sectors needing stringent security measures. However, improvements in update frequency, Mac integration, and pricing, along with enhanced reporting and console access, are needed to broaden market reach. Organizations value its scalability and flexibility, despite needing better support and development maturity.
What Features Define BeyondTrust Endpoint Privilege Management?BeyondTrust Endpoint Privilege Management is widely adopted in the finance and healthcare industries for privileged access management and compliance. It is instrumental in secure server access and remote management, aligning with zero-trust approaches and integrating smoothly with enterprise platforms.
IBM Security Identity Governance and Intelligence is a comprehensive platform designed to help businesses manage identity governance and compliance. It enables organizations to streamline processes while ensuring security.
Focusing on identity governance, IBM Security Identity Governance and Intelligence offers valuable features that enhance security and operational efficiency. It provides tools for effective access management and auditing, ensuring that enterprises maintain compliance with regulations. As businesses navigate complex regulatory environments, this platform becomes crucial in safeguarding sensitive information and supporting IT governance strategies, ultimately securing business operations and data integrity.
What are the key features of IBM Security Identity Governance and Intelligence?IBM Security Identity Governance and Intelligence is implemented across industries such as finance, healthcare, and retail. In finance, it supports stringent compliance requirements, ensuring data protection and secure transactions. In healthcare, it safeguards patient data, enabling secure access for medical professionals while maintaining privacy standards. Retailers use it to protect consumer data and streamline employee access management, ensuring both customer trust and efficient back-end operations.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.