We have installed servers where all the applications are published. People open the published application and use it. Integration is easy. We faced some challenges in the beginning, but now it is fine. The product is mature. We have a lot of demand for the product in our region. I recommend the product to everybody. Banks also use the solution. They recommend it, too. Overall, I rate the product an eight and a half to nine out of ten.
The solution is doing a good job of enhancing the endpoint security posture by managing the overall application life cycle and helping us block unwanted applications. The solution's scanning feature helps identify the unmanaged accounts within the console itself. We do not have to do a DNA scan like CyberArk separately, which is a separate license. The solution's least privilege enforcement has helped us ensure access is given to only the required people. It is easy to maintain the solution. The solution helps identify the unmanaged accounts and then develop a plan for managing those transferred accounts, which were used as service accounts in multiple critical applications. Users should have an in-house person to manage the environment. If they completely depend upon the vendors, they might be unable to do things at the right pace. Overall, I rate the solution an eight out of ten.
When evaluating this product, it's more effective to base the assessment on your specific use cases rather than comparing it to other products. If the product aligns with ninety percent of your use cases and meets your needs, it would strongly indicate that proceeding with this product is a favorable choice. Overall, I would rate it eight out of ten.
Information Technology System Analyst at a tech services company with 1,001-5,000 employees
Real User
Top 10
2023-06-09T15:24:00Z
Jun 9, 2023
I would advise if you're using BeyondTrust Endpoint Privilege Management for the first time, seek professional services directly from BeyondTrust, not from a vendor or supplier role. Take professional services directly from BeyondTrust EPM. Overall, I would rate the solution an eight out of ten because I'm also missing something on the pricing side. I'm missing something on the configuration side. Those things are missing.
I would rate the solution an eight out of ten. You can deploy the solution to Azure, AWS, or on-premises. This solution will be very helpful for organizations for security purposes. The tool is very user-friendly. The solution’s graphic user interface is also very easy compared to other products.
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Hire someone who knows the standards and knows how to align the product against the standards. That ability is why you should buy this product. The product is really good for GDPR, HIPAA, and medical compliance. I also like it for risk reduction. I can take a customer that is non-compliant with 27001, an organization that failed their registrar audit, and get them to compliance with this product fairly quickly; in half a year. That's good. Policy changes could be easier and better aligned with HITRUST and GDPR, although we can do them. We don't do a whole lot of whitelisting since everything we do is regulated. Part of what I have to do is all my own policy changes for the HITRUST GDPR.
We are a partner and we sell and support this EPM solution to other customers. We use both cloud and on-premises deployment options. I'd suggest new users go slow. Instead of going bold. It's a powerful solution. If I create a beautiful policy, the product will behave beautifully. However, if I create an ugly policy, the product will show its ugly face to you, as it's just a brainless bull running around. You have to give it a direction. Otherwise, it can harm you. Overall, I would rate the solution an eight out of ten.
Sr. Manager Cyber Security at a manufacturing company with 10,001+ employees
Real User
2022-01-31T17:21:00Z
Jan 31, 2022
I would advise going for the cloud-based solution. The cloud-based solution has come a long way from its initial stage. It is a very simplified solution. Their licenses are very straightforward, simple, and accommodating. The support has been really good, and their flexible policy model has really been instrumental in going for a stage-by-stage approach. You don't have to go all the way to impact your environment from day one. You can define your policies using their quick policy wizard and other processes to simplify your environment. You should proceed step-by-step to get rid of the local admin and the environment. Evaluation with their simplistic and flexible model is going to make it much easier and faster for you to pick up the solution. I would rate it a nine out of 10. There is always a scope for improvement.
It is mainly deployed on-prem. About 95% of the sales that I do are on-prem solutions. That's because we're talking about security. It is a good technology. I would definitely recommend this solution. I would never sell it if I can't recommend it. I would give it an eight out of 10.
Windows Enterprise Engineer at a comms service provider with 1,001-5,000 employees
Real User
2021-07-01T16:44:19Z
Jul 1, 2021
We are a customer and an end-user. I'm not sure which version of the solution we're on right now. I cannot speak to the exact version number we are using. I would definitely recommend the product to other companies and users. For us, it's a very important organizational tool. Overall, I would rate it at an eight out of ten. We're mostly quite satisfied with its capabilities.
General Manager, Head of Information Security at a tech services company with 51-200 employees
Reseller
2020-11-05T07:26:32Z
Nov 5, 2020
Overall, I'd rate the solution five out of ten. I would definitely recommend it, however, I would recommend organizations test a couple of solutions based on their requirements. There will be a different requirement for a retail outlet and a different requirement for an oil and gas company. Even though it is privileged remote access, different accesses most likely need to be granted. If somebody is a software developer, and somebody is just for support, they will need different types of access. Whether this solution offers that a company needs depends on different requirements from different end-users.
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
Reseller
2020-01-29T11:24:00Z
Jan 29, 2020
This is a good solution that I would recommend, but in the Nigerian market, the price of this solution is challenging. Many companies are choosing competing solutions like CyberArk because the cost is lower. If the price were more friendly then it would have a better share of the market. I would rate this solution an eight out of ten.
Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
Reseller
2020-01-27T06:39:00Z
Jan 27, 2020
We're a BeyondTrust reseller. I'd recommend the solution. However, the pricing is not competitive and I find in the Nigerian market we're losing ground to CyberArk because the pricing is so unfriendly for the region. They need to try and match their competitors here in order to stay competitive overall in the market. I'd rate the solution eight out of ten.
Consultant- Information Security at a tech services company with 11-50 employees
Consultant
2020-01-12T12:03:00Z
Jan 12, 2020
This program has a good reputation in the market and it is more required for the security of your infrastructure. It is a product that you can trust. The only thing I'm looking for in the next version is that the bug fixes have to be more frequent and the solution has to be more reliable and more flexible. On a scale from one to 10, I'll give it a six.
VP Cyber Risk at a tech services company with 501-1,000 employees
Real User
2019-12-04T05:40:00Z
Dec 4, 2019
Approach it slowly. Don't rush in and drop things down there. Do it carefully, because you might end up breaking access to systems, which is complicated when you're running a production environment. Make sure you go through the testing process vigorously before you deploy. I would give BeyondTrust a seven out of ten. There are some features in CyberArk that are better, cheaper, or easier to implement. Some of those running in CyberArk don't have the conflicts that BeyondTrust has, as there are many products in the suite. You've got to compare apples with apples.
Don't start the implementation until you get the prerequisite sheet confirmed from the customer. If not, you may waste a lot of time at the customer's site. I have learned a couple of things from this product. First, if the organization doesn't have a structured hierarchy of the work or the segregation of duties properly implemented, no matter what kind of security there is, it tends to fail. Operationally, it tends to fail. The tasks never get finished. BeyondTrust helps define those duties properly. That was one major thing. The other thing I learned is that PAM is not for an inexperienced person. Don't give a PAM solution to a company that is employing inexperienced people, because they will never understand the concept of security and why identity security is important. I would rate this solution as eight and a half or nine out of ten. I am not saying ten, only because of the limited choice of Windows. If it had alternate options available, I would give it a ten.
I would rate BeyondTrust at eight out of 10. It's not a 10 because the scalability and licensing have impacted us a lot. Of the two points that I have deducted: One is the non-flexibility on the pricing and one is the licensing model. When you launch a product in several markets like the European market, the Asian market, or the Russian market, you have to be very flexible when it comes to the pricing.
Security Staff Engineer at a tech vendor with 1,001-5,000 employees
Real User
2018-06-24T08:17:00Z
Jun 24, 2018
Implementation is simple, but privileged application support may need a lot of testing. Support may not be able to help due to a lack of understanding of your environment.
BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.
Key Solutions Include:
-ENTERPRISE PASSWORD SECURITY
Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged...
We have installed servers where all the applications are published. People open the published application and use it. Integration is easy. We faced some challenges in the beginning, but now it is fine. The product is mature. We have a lot of demand for the product in our region. I recommend the product to everybody. Banks also use the solution. They recommend it, too. Overall, I rate the product an eight and a half to nine out of ten.
The solution is doing a good job of enhancing the endpoint security posture by managing the overall application life cycle and helping us block unwanted applications. The solution's scanning feature helps identify the unmanaged accounts within the console itself. We do not have to do a DNA scan like CyberArk separately, which is a separate license. The solution's least privilege enforcement has helped us ensure access is given to only the required people. It is easy to maintain the solution. The solution helps identify the unmanaged accounts and then develop a plan for managing those transferred accounts, which were used as service accounts in multiple critical applications. Users should have an in-house person to manage the environment. If they completely depend upon the vendors, they might be unable to do things at the right pace. Overall, I rate the solution an eight out of ten.
When evaluating this product, it's more effective to base the assessment on your specific use cases rather than comparing it to other products. If the product aligns with ninety percent of your use cases and meets your needs, it would strongly indicate that proceeding with this product is a favorable choice. Overall, I would rate it eight out of ten.
I rate the solution a seven out of ten.
I would advise if you're using BeyondTrust Endpoint Privilege Management for the first time, seek professional services directly from BeyondTrust, not from a vendor or supplier role. Take professional services directly from BeyondTrust EPM. Overall, I would rate the solution an eight out of ten because I'm also missing something on the pricing side. I'm missing something on the configuration side. Those things are missing.
I would rate the solution an eight out of ten. You can deploy the solution to Azure, AWS, or on-premises. This solution will be very helpful for organizations for security purposes. The tool is very user-friendly. The solution’s graphic user interface is also very easy compared to other products.
Hire someone who knows the standards and knows how to align the product against the standards. That ability is why you should buy this product. The product is really good for GDPR, HIPAA, and medical compliance. I also like it for risk reduction. I can take a customer that is non-compliant with 27001, an organization that failed their registrar audit, and get them to compliance with this product fairly quickly; in half a year. That's good. Policy changes could be easier and better aligned with HITRUST and GDPR, although we can do them. We don't do a whole lot of whitelisting since everything we do is regulated. Part of what I have to do is all my own policy changes for the HITRUST GDPR.
We are a partner and we sell and support this EPM solution to other customers. We use both cloud and on-premises deployment options. I'd suggest new users go slow. Instead of going bold. It's a powerful solution. If I create a beautiful policy, the product will behave beautifully. However, if I create an ugly policy, the product will show its ugly face to you, as it's just a brainless bull running around. You have to give it a direction. Otherwise, it can harm you. Overall, I would rate the solution an eight out of ten.
I would advise going for the cloud-based solution. The cloud-based solution has come a long way from its initial stage. It is a very simplified solution. Their licenses are very straightforward, simple, and accommodating. The support has been really good, and their flexible policy model has really been instrumental in going for a stage-by-stage approach. You don't have to go all the way to impact your environment from day one. You can define your policies using their quick policy wizard and other processes to simplify your environment. You should proceed step-by-step to get rid of the local admin and the environment. Evaluation with their simplistic and flexible model is going to make it much easier and faster for you to pick up the solution. I would rate it a nine out of 10. There is always a scope for improvement.
It is mainly deployed on-prem. About 95% of the sales that I do are on-prem solutions. That's because we're talking about security. It is a good technology. I would definitely recommend this solution. I would never sell it if I can't recommend it. I would give it an eight out of 10.
We are a customer and an end-user. I'm not sure which version of the solution we're on right now. I cannot speak to the exact version number we are using. I would definitely recommend the product to other companies and users. For us, it's a very important organizational tool. Overall, I would rate it at an eight out of ten. We're mostly quite satisfied with its capabilities.
I would rate BeyondTrust Endpoint Privilege Management a nine out of ten.
Overall, I'd rate the solution five out of ten. I would definitely recommend it, however, I would recommend organizations test a couple of solutions based on their requirements. There will be a different requirement for a retail outlet and a different requirement for an oil and gas company. Even though it is privileged remote access, different accesses most likely need to be granted. If somebody is a software developer, and somebody is just for support, they will need different types of access. Whether this solution offers that a company needs depends on different requirements from different end-users.
This is a good solution that I would recommend, but in the Nigerian market, the price of this solution is challenging. Many companies are choosing competing solutions like CyberArk because the cost is lower. If the price were more friendly then it would have a better share of the market. I would rate this solution an eight out of ten.
We're a BeyondTrust reseller. I'd recommend the solution. However, the pricing is not competitive and I find in the Nigerian market we're losing ground to CyberArk because the pricing is so unfriendly for the region. They need to try and match their competitors here in order to stay competitive overall in the market. I'd rate the solution eight out of ten.
This program has a good reputation in the market and it is more required for the security of your infrastructure. It is a product that you can trust. The only thing I'm looking for in the next version is that the bug fixes have to be more frequent and the solution has to be more reliable and more flexible. On a scale from one to 10, I'll give it a six.
Approach it slowly. Don't rush in and drop things down there. Do it carefully, because you might end up breaking access to systems, which is complicated when you're running a production environment. Make sure you go through the testing process vigorously before you deploy. I would give BeyondTrust a seven out of ten. There are some features in CyberArk that are better, cheaper, or easier to implement. Some of those running in CyberArk don't have the conflicts that BeyondTrust has, as there are many products in the suite. You've got to compare apples with apples.
Don't start the implementation until you get the prerequisite sheet confirmed from the customer. If not, you may waste a lot of time at the customer's site. I have learned a couple of things from this product. First, if the organization doesn't have a structured hierarchy of the work or the segregation of duties properly implemented, no matter what kind of security there is, it tends to fail. Operationally, it tends to fail. The tasks never get finished. BeyondTrust helps define those duties properly. That was one major thing. The other thing I learned is that PAM is not for an inexperienced person. Don't give a PAM solution to a company that is employing inexperienced people, because they will never understand the concept of security and why identity security is important. I would rate this solution as eight and a half or nine out of ten. I am not saying ten, only because of the limited choice of Windows. If it had alternate options available, I would give it a ten.
I would rate BeyondTrust at eight out of 10. It's not a 10 because the scalability and licensing have impacted us a lot. Of the two points that I have deducted: One is the non-flexibility on the pricing and one is the licensing model. When you launch a product in several markets like the European market, the Asian market, or the Russian market, you have to be very flexible when it comes to the pricing.
For a Windows/Linux/Unix mixed environment, it is a good product to management privilege account passwords to prevent security breaches.
Take care regarding the SQL database.
Implementation is simple, but privileged application support may need a lot of testing. Support may not be able to help due to a lack of understanding of your environment.