Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs Omada Identity comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.9
BeyondTrust Endpoint Privilege Management boosts ROI by enhancing security and compliance, supporting zero-trust adoption and marketplace participation.
Sentiment score
6.4
Omada Identity's high initial cost is offset by reduced maintenance costs, improved security, and process efficiency, but ROI measurement is challenging.
 

Customer Service

Sentiment score
7.1
Mixed reviews for BeyondTrust support, citing knowledgeable help but variable response times and lack of local Australian assistance.
Sentiment score
6.9
Omada Identity's technical support is praised for responsiveness, but outdated documentation and inconsistent response times pose challenges.
We do not contact their technical support directly because we have a service agreement already in place with them with some dedicated and some non-dedicated resources.
 

Scalability Issues

Sentiment score
7.4
BeyondTrust Endpoint Privilege Management offers exceptional scalability, effectively supporting large user bases with minimal performance impact and high stability.
Sentiment score
7.7
Omada Identity is praised for its scalability in cloud and hybrid environments, despite minor performance and customization feedback.
 

Stability Issues

Sentiment score
7.5
BeyondTrust Endpoint Privilege Management is mostly stable, with occasional minor bugs, quickly resolved issues, and an eight out of ten rating.
Sentiment score
7.6
Omada Identity is stable, with minimal issues, occasional bugs, and high ratings for reliability and performance.
 

Room For Improvement

BeyondTrust Endpoint Privilege Management needs UI, integration, reporting, compatibility, pricing improvements, and enhanced support and user guidance.
Omada Identity needs UI improvements, better scalability, integration, documentation, and cost-effective upgrades, with enhanced API and automation.
The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user experience.
 

Setup Cost

BeyondTrust offers flexible licensing with varying costs, seen as both expensive and valuable, especially for Mac clients.
Omada Identity offers cost-effective on-premises pricing, though cloud options are pricier, with flexible negotiations available for enterprises.
They are lower than some of their competitors.
 

Valuable Features

BeyondTrust Endpoint Privilege Management enhances security with privilege control, risk reduction, and integration capabilities for efficient endpoint security management.
Omada Identity provides governance, customization, integration, and automation for efficient identity lifecycle management with advanced reporting and strong API connectivity.
Technically, the product does everything one would expect from an identity and access management platform.
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
28
Ranking in other categories
Privileged Access Management (PAM) (9th), Anti-Malware Tools (12th)
Omada Identity
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
48
Ranking in other categories
User Provisioning Software (3rd), Identity Management (IM) (4th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (5th), Customer Identity and Access Management (CIAM) (3rd)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. BeyondTrust Endpoint Privilege Management is designed for Privileged Access Management (PAM) and holds a mindshare of 4.5%, down 6.0% compared to last year.
Omada Identity, on the other hand, focuses on Identity Management (IM), holds 3.9% mindshare, down 4.1% since last year.
Privileged Access Management (PAM)
Identity Management (IM)
 

Featured Reviews

Marlin B Pohlman - PeerSpot reviewer
Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us
The most important factor is the ability to invoke least privilege, which is required under 27701 and GDPR. We have used the solution to remove users' administrative rights and instead provide on-demand, token-based administrative rights. The latter is an option for a single, temporary increase in privileges for a trusted user for a specific time. We use it in a medical environment for HIPAA compliance or medical compliance in a GDPR case. For example, if you have a clinician who needs access to a specific piece of medical information, or if there is an administrator who needs to have administrator rights to a particular database for a limited period of time, we can give it and then revoke it. That's another reason the tool is useful. Also, the fact that we are able to add events straight from event logs and/or the database is important for crisis management and rapid reaction. This ability helps us meet our SLA requirements. In addition, we can elevate approved applications and actions without broad administrative rights. We can temporarily increase privilege based on tasks. If someone puts in a ticket, we increase their privilege for that ticket. We then watch to see if that ticket has been resolved and then we decrease it. Another feature of the platform is instant risk reduction solutions. We can do a risk metric with it, and we do that as part of our risk evaluation. We can increase and decrease privilege and we can actually show that in the ISO 13485 risk metric. And it provides a single solution for managing endpoint security preferences. It does a good job of that.
Pernilla Hulth - PeerSpot reviewer
The interface is easy to use and gives you a solid overview
The cloud-based deployment was straightforward, but the on-prem deployment was in a highly complex ecosystem. Omada has matured since then. I wouldn't say that it isn't straightforward, but it depends on the customer. A standard deployment is relatively easy, but it can be more painful if you need a lot of customization. We deployed the cloud solution in around four months, nearly meeting the 12-week benchmark. The on-prem deployment took three years. It was a highly complex ecosystem that was dependent on other systems. Depending on the size of your environment, you need a product owner and some specialists for maintenance. My last customer was a university with a complex environment. They had around 12 people involved in maintenance at that organization. Typically, it's between 2-5 people.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
825,399 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
14%
Manufacturing Company
10%
Government
8%
Financial Services Firm
17%
Computer Software Company
13%
Manufacturing Company
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What do you like most about Omada Identity?
We don't have to go in and do a lot of the work that we did before. It may have saved us somewhere in the range of 10 to 30 percent of the time we spent on provisioning access.
What needs improvement with Omada Identity?
There are some technical bits and pieces that we have looked at that could be better. For instance, when you do a recalculation of an identity, it's hard to understand what was incorrect before you...
What is your primary use case for Omada Identity?
We wanted a solution that could help us make HR the master of identities. We wanted a solution that could take that data and direct it into all our other directories and Active Directory.
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
Omada Identity Suite, Omada Identity Cloud
 

Learn More

Video not available
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group, BMW Group, Deutsche Leasing
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: December 2024.
825,399 professionals have used our research since 2012.