BeyondTrust Endpoint Privilege Management and Symantec Privileged Access Manager are prominent contenders in the privileged access management category. BeyondTrust has the upper hand in pricing and deployment, while Symantec stands out in advanced features and security capabilities.
Features: BeyondTrust offers scalability, effective endpoint privilege management, and seamless integration. Symantec provides comprehensive access controls, superior security measures, and an extensive feature set catering to advanced security needs.
Room for Improvement: BeyondTrust needs enhancements in reporting tools, more customization in policy implementation, and additional integrations. Symantec users seek a smoother upgrade process, more intuitive configuration settings, and reduction in deployment time.
Ease of Deployment and Customer Service: BeyondTrust is simpler to deploy with a quick setup and reliable customer support. Symantec, despite its responsive support team, faces challenges with complex deployment processes requiring additional time and resources.
Pricing and ROI: BeyondTrust is recognized for economical setup costs and good ROI, appealing to budget-conscious users. Symantec, while more costly upfront, delivers significant value through its robust features and high ROI, justifying its pricing for enterprises seeking comprehensive security features.
BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.
Key Solutions Include:
-ENTERPRISE PASSWORD SECURITY
Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.
-ENDPOINT LEAST PRIVILEGE
Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.
-SERVER PRIVILEGE MANAGEMENT
Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.
-A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS
Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.
Learn more at https://www.beyondtrust.com/privilege-management
CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources. It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.