Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs Saviynt comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Ranking in Privileged Access Management (PAM)
5th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
29
Ranking in other categories
Anti-Malware Tools (9th)
Saviynt
Ranking in Privileged Access Management (PAM)
11th
Average Rating
7.4
Reviews Sentiment
6.6
Number of Reviews
23
Ranking in other categories
User Provisioning Software (4th), Identity Management (IM) (5th), Identity Threat Detection and Response (ITDR) (10th), Identity and Access Management (3rd)
 

Mindshare comparison

As of March 2025, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Endpoint Privilege Management is 3.9%, down from 5.6% compared to the previous year. The mindshare of Saviynt is 3.9%, up from 3.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Prashant Uppuluri - PeerSpot reviewer
Provides critical application control and ensures security with a flexible setup process
Regarding the feedback scenario, it's a tough question as I have thoroughly gone through the entire partner portal and library of BeyondTrust, as well as BeyondTrust University. I have also interacted with support whenever a ticket is raised, ranging from P1 to P3 or P2. Most end users and partners seem happy and content with BeyondTrust. The deployment of the solution is generally easy, flexible, and scalable. However, it can be challenging in certain environments, especially regarding management. Improvements could focus on adding more AI features to automate processes that are currently manual or challenging for end users. In some cases of competition, I have noted specific use cases where the recording of sessions was an endpoint for BeyondTrust, providing an edge for higher management. The ability to view recorded live sessions of specific users is a crucial benefit.
VinayM - PeerSpot reviewer
Used for IAM, IGA, MFA, SSO, and access management
The technical support team's response time could be improved. After the implementation, Saviynt should provide good support to their customers. While migrating from legacy applications to the cloud, Saviynt has many bugs. The lift and shift are not very seamless. There are a lot of customizations to be done and some development is required. From the migration point of view, the solution is a little buggy.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"The product is secure."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"The feature that we use the most is the global, third-party user management."
"The product is flexible to use."
"It gives very good and in-depth knowledge about a particular identity. Everything is through a single click. We get to know the workflows related to a particular identity with a single click."
"It's a highly functional system and a very well rounded solution. The onboarding of applications is solid. Their user access reviews are very good. Their role-based model and their identity life cycle stuff are solid. It's a very well rounded, strong product."
"The most valuable features of Saviynt are database utility and report generation. These two features have a major impact, particularly when you are trying to create a report because, in other systems, you need to use a third-party utility such as a BI tool or any other reporting tool to fetch the data and send out the report to a third party team. In Saviynt, it's a system within a system, so you don't have to use any third-party tool because you can directly do your query and write that code on Saviynt and then send that report to the team."
"Saviynt risk-based access requests and intelligent access controls have made a significant impact on our company."
"The workflow in Saviynt is easier compared to other tools. It's pretty straightforward."
"The repository has many features where you can define primary and secondary owners."
 

Cons

"The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does."
"Reports to the end user."
"Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful."
"It only has limited support for Mac."
"Their technical support could be more responsive and helpful."
"If you don't get the implementation right at the outset, you will struggle with the product."
"They need to come up with better integrative options which should be customer-centric."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"The configuration process at the beginning can be difficult, depending on the complexity of the company."
"The custom application integration is a little complex, and this tool doesn't provide so many plugins or additional applications."
"The tool is difficult to migrate."
"Considering the shortcomings of the tool, I would say that the training part of the product needs improvement."
"It should support more customizations. In SailPoint, we can do many customizations, but we are not able to do that in Saviynt. For workflows and other things, we can only use what is already in place. Saviynt has a lot of scope for improvement on the customization part."
"The product can improve the customer support offered to users since it is an area with shortcomings."
"The technical support team's response time could be improved."
"We sometimes experience performance issues when the solution fails to process the data between two different applications."
 

Pricing and Cost Advice

"The solution's pricing is high."
"This solution is expensive compared to its competitors."
"What BeyondTrust was providing was user-based licensing which was a great benefit from the client point of view. Recently, I don't know why, the licensing model has been changed, and that is the reason that they have lost a bit of their edge when it comes to the PAM, against our competition. The asset-based licensing, from the user's point of view, is not beneficial. The licensing should be based on the users. The greater the number of users, the greater will be the load and the greater the scalability problems. I presume that is why the licensing model has changed."
"It was very expensive."
"Its pricing and licensing are okay. We were in the perpetual model when it was on-prem, and now, with the SaaS service, we have a subscription model. As a customer, I would always like to see a lower price, but it seems to be priced at the right model currently, and we are trying to get the maximum benefits out of it."
"Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
"I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions."
"It is relatively more cost-effective compared to the competing product."
"The solution has a pay-as-you-go licensing model, and you can subscribe monthly or yearly."
"The price of the license for this product is quite expensive."
"We are not into the licensing part. The clients take care of the licensing part."
"If you need to make any changes then there are additional fees."
"Saviynt's pricing is acceptable and licensing costs are yearly."
"Saviynt's pricing is reasonable."
"Saviynt has a competitive price."
"The product is less expensive than one of the competitors."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
839,422 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
14%
Manufacturing Company
10%
Government
8%
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
8%
Healthcare Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
Setup costs vary depending on the scenario. Sometimes we win orders, and other times we lose due to partner preferences or deal scenarios. Customers may negotiate on price, understanding that quali...
What do you like most about Saviynt?
It is very easy to use. It addresses most of the trends in identity governance and risk management.
What is your experience regarding pricing and costs for Saviynt?
The pricing is comparable to Azure Entra ID. Kind of the same. So, the pricing is okay.
What needs improvement with Saviynt?
Considering the shortcomings of the tool, I would say that the training part of the product needs improvement. The information that Saviynt provides in the training sessions can be a little more pr...
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
No data available
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Shell, McKesson, Kimberly-Clark, Ingram Micro, Intermountain Health Care, Forterra, CoreLogic
Find out what your peers are saying about BeyondTrust Endpoint Privilege Management vs. Saviynt and other solutions. Updated: January 2025.
839,422 professionals have used our research since 2012.