Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs Symantec Identity Governance and Administration comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.8
Organizations maximize BeyondTrust for compliance, integrating it within zero-trust frameworks to meet standards and enhance security.
Sentiment score
7.6
Symantec Identity Governance boosts ROI by streamlining onboarding, enabling self-service, and automating user management, enhancing IT efficiency.
 

Customer Service

Sentiment score
7.1
BeyondTrust Endpoint Privilege Management offers skilled support with some delays, particularly outside U.S. hours, yet generally efficient service.
Sentiment score
6.2
Symantec's customer service is praised for responsiveness but needs improvement in geographical support and complex issue expertise.
 

Scalability Issues

Sentiment score
7.4
BeyondTrust Endpoint Privilege Management is scalable, reliable, and adaptable for diverse organizational needs, supporting large infrastructures seamlessly.
Sentiment score
7.3
Symantec Identity Governance scales well and adapts to organizational needs, though some face customization and resource challenges.
The initial understanding of the environment is crucial, followed by a simple deployment process.
 

Stability Issues

Sentiment score
7.5
BeyondTrust Endpoint Privilege Management is stable, reliable, with minimal issues, praised for driver compatibility and cloud deployment stability.
Sentiment score
6.6
Symantec Identity Governance's stability is generally satisfactory, with performance issues arising under heavy loads or improper tuning.
 

Room For Improvement

BeyondTrust requires UI and reporting enhancements, better integration, more updates, improved navigation, lower cost, and increased support responsiveness.
Symantec Identity Governance needs improvements in UI, integration, documentation, security, cloud performance, scalability, and user-friendliness.
 

Setup Cost

BeyondTrust Endpoint Privilege Management's pricing is flexible but often viewed as high, especially for Mac clients compared to competitors.
Symantec Identity Governance pricing is mid-range, seen as expensive, with flexible licensing but time-consuming implementation.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
 

Valuable Features

BeyondTrust Endpoint manages privileges and vulnerabilities, enhancing security, compliance, and operational control with integration and efficiency across platforms.
Symantec Identity Governance streamlines provisioning, access control, and policy compliance with flexible integration and user-friendly self-service features.
Administrators need a tool that provides visibility and clarity about endpoint management within the organization.
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
29
Ranking in other categories
Privileged Access Management (PAM) (5th), Anti-Malware Tools (9th)
Symantec Identity Governanc...
Average Rating
7.6
Reviews Sentiment
6.7
Number of Reviews
66
Ranking in other categories
User Provisioning Software (12th), Identity Management (IM) (28th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. BeyondTrust Endpoint Privilege Management is designed for Privileged Access Management (PAM) and holds a mindshare of 4.2%, down 5.5% compared to last year.
Symantec Identity Governance and Administration, on the other hand, focuses on Identity Management (IM), holds 1.4% mindshare, up 1.1% since last year.
Privileged Access Management (PAM)
Identity Management (IM)
 

Featured Reviews

Prashant Uppuluri - PeerSpot reviewer
Provides critical application control and ensures security with a flexible setup process
Regarding the feedback scenario, it's a tough question as I have thoroughly gone through the entire partner portal and library of BeyondTrust, as well as BeyondTrust University. I have also interacted with support whenever a ticket is raised, ranging from P1 to P3 or P2. Most end users and partners seem happy and content with BeyondTrust. The deployment of the solution is generally easy, flexible, and scalable. However, it can be challenging in certain environments, especially regarding management. Improvements could focus on adding more AI features to automate processes that are currently manual or challenging for end users. In some cases of competition, I have noted specific use cases where the recording of sessions was an endpoint for BeyondTrust, providing an edge for higher management. The ability to view recorded live sessions of specific users is a crucial benefit.
Efrén Yanez - PeerSpot reviewer
Identifies, debugs and models the privileges of your organization, adapting it to business strategies.
* Identifies, debugs and models the privileges of your organization, adapting it to business strategies. * Helps discover roles based on available patterns ("basic roles" / "Iterated Search" / "Characteristic Roles" / "Rule Hierarchies Roles" / "User Hierarchy Based Roles" / "Structured Search" / "Obvious Roles"). * Enables review campaigns to certify user privileges, roles and resources, activating the RACI model in the process. * Identity Governance comes with Connector Xpress but if you have Identity Manager you can use the integration between them and import the information that comes from CA Identity Manager and its connectors. * Allows the construction of segregation of rights (SoD) rules by definition of the client and enables “detective" and "corrective" levels for violations of business rules policies. * Provides a set of SoD rules for SAP in order to apply "best practices" to this type of "endpoint" (more than 3,000 rules / Consult CA Technologies if available in last version). * Helps to analyze privileges to find points of cleaning and improvement (Similar Roles / Roles Hierarchy / dual link / Suspect connections / Collectors, etc.). * Regulatory compliance is one of the objectives of the solution. * Covers the life cycle of enterprise privileges and maintains the role model "shallow" or "deep" / "functional" or "granular per application". * Helps you take advantage of the Identity Governance on the portal but better if you integrate with Identity Suite (best user experience). * You can enable LDAP authentication (AD/others) or integrate with CA Single Sign-On for portal access. * Real integration between CA Identity Manager and CA Identity Governance for better use of compliance approved roles, data exchange, and improved customer experience. * Data Transformation available using PDI (Pentaho Data Integration) * New functionality when integrating with Identity Portal.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
832,138 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
13%
Manufacturing Company
10%
Government
8%
Computer Software Company
27%
Financial Services Firm
18%
Manufacturing Company
8%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
Setup costs vary depending on the scenario. Sometimes we win orders, and other times we lose due to partner preferences or deal scenarios. Customers may negotiate on price, understanding that quali...
What do you like most about Symantec Identity Governance and Administration?
The product’s most valuable feature is flexibility. It can be customized as per the customer’s requirements.
What is your experience regarding pricing and costs for Symantec Identity Governance and Administration?
The pricing has been very reasonable, but licensing costs vary based on the customer. It follows a user-based licensing model.
What needs improvement with Symantec Identity Governance and Administration?
Symantec should develop a SaaS solution for cloud environments to make the solution available in various marketplaces for easy deployment. It should also offer bundle installation instead of one by...
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
CA Identity Suite, Symantec IGA, Layer7 Identity Suite, CA Identity Manager (CA IDM), CA Identity Minder, CA IAM, CA Identity Manager (CA IDM), CA Identity Governance
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Acciona, Core Blox, DBS
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: January 2025.
832,138 professionals have used our research since 2012.