PAM Architect at a tech services company with 11-50 employees
MSP
Top 10
A stable, scalable, and easy-to-deploy solution that can track malicious use or send analytics to a host
Pros and Cons
  • "What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
  • "What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."

What is our primary use case?

We are an integrator, and we do a lot of Identity and Access Management and Privileged Identity. I am only just getting into this solution. I am not trained in it, but I've been reading about it. I have recommended it for a client based on their requirements and based on what I know about CyberArk versus a couple of others. I have not implemented it yet. I have the agent running on the system where I am actually profiled. I have its latest version.

In terms of use case, it primarily has two things, and you can choose whatever you want in the middle. One side is that you can use it to allow the user to have specific administrative rights and do certain things without having to call the help desk. For example, you can allow users to be able to install certain applications. You can also have a whitelist or a blacklist of things that they are allowed to install, which saves a boatload of money in calling the help desk. The other side is to rein in administrators so that they don't go too far or do something outside of the bounds. The help desk personnel would have different restrictions when they log into a workstation than regular users.

What is most valuable?

What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. 

It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy.

What needs improvement?

What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way.

For how long have I used the solution?

I started using it about a month ago when I was doing the appraisal of it, and I put it on a virtual machine. Our work machine is a virtual machine.

Buyer's Guide
BeyondTrust Endpoint Privilege Management
May 2024
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,394 professionals have used our research since 2012.

What do I think about the stability of the solution?

It is very stable. I had worked on a competitor's product two years ago, and it was rather buggy. It had issues. Sometimes, it used to hang the machine. Because you're running an agent on the workstation, it could have a memory conflict or an application conflict. It doesn't happen anymore because you've got it pretty much running strictly in Windows.

What do I think about the scalability of the solution?

It is very scalable. 

How are customer service and support?

I used their email support, which is very good.

Which solution did I use previously and why did I switch?

I didn't switch the client to this one. I recommended this one because it stays under the BeyondTrust umbrella. It also helped them in getting a discount for volume and being a loyal customer and things like that. They also didn't have to add new infrastructure. 

CyberArk is a very good product, and I like it. I've been trained in it, but I have not implemented it. I am not going to ask the customer to install another infrastructure or another platform, especially when the products are fairly equal or equal enough to not be an issue to put on a table. If I had recommended CyberArk, they would have to put in a CyberArk infrastructure and retrain a whole bunch of administrators to administer that. They would also have to train a whole bunch of support people to manage off-hours, holidays, weekends, and things like that. Every time you add another brand, it adds to your soft costs, which can make a solution pretty expensive.

Hard costs are so much fun, and they're much easier. I've seen people get up and just start writing on a dry erase board because they know all the hard costs. It would be good if they would just be honest with themselves and the clients and explain what some of the soft costs are in terms of additional training or a more significant hardware footprint.

How was the initial setup?

It is pretty straightforward to get the agent installed. You install the agent and the server component, and you let the users do whatever they've been doing for the last 10 or 20 years of their life. You also create profiles. For example, I had a developer profile for both Windows and Linux, and I had a profile for a regular user, help desk, and engineering. After you create profiles, an administrator can look at their activities in the log and analyze things like the following:

  • Why did he install CCleaner on the machine?
  • Why did he install this application?
  • Why did he elevate a command prompt to do something? What is he doing?
  • Why does he need administrator command prompts?

You can then add things like this to your blacklist, and you can create a profile that will allow or disallow that.

    What other advice do I have?

    I would rate BeyondTrust Endpoint Privilege Management a nine out of ten. 

    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    Security Staff Engineer at a tech vendor with 1,001-5,000 employees
    Real User
    Helps us reduce major vulnerabilities by removing local administrator privileges
    Pros and Cons
    • "Reduces major vulnerabilities by removing local administrator privileges."
    • "It only has limited support for Mac."

    What is our primary use case?

    We use it to limit user privileges.

    How has it helped my organization?

    It reduces major vulnerabilities by removing local administrator privileges.

    What is most valuable?

    I like that I can remove local admin privileges from developers.

    What needs improvement?

    It only has limited support for Mac.

    For how long have I used the solution?

    Less than one year.

    What do I think about the stability of the solution?

    In version 7.3 there were driver compatibility issues with other security applications, but they were resolved very quickly by support.

    What do I think about the scalability of the solution?

    The BeyondInsight appliance environment is not as flexible as it should be in some designs. But overall, it’s a well-designed product.

    How is customer service and technical support?

    I would rate support at six out of 10. They need more people in the Pacific time zone.

    How was the initial setup?

    The setup was straightforward. The appliance build was very simple and was completed with minimal effort.

    What's my experience with pricing, setup cost, and licensing?

    PowerBroker for a Mac client is three times the price of the Windows version.

    Which other solutions did I evaluate?

    • Avecto
    • Thycotic
    • Viewfinity

    What other advice do I have?

    Implementation is simple, but privileged application support may need a lot of testing. Support may not be able to help due to a lack of understanding of your environment.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    BeyondTrust Endpoint Privilege Management
    May 2024
    Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
    770,394 professionals have used our research since 2012.
    Technical Manager at Gulf IT
    Reseller
    Top 5
    Great session management features and out-of-box connectors
    Pros and Cons
    • "I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording."
    • "The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."

    What is our primary use case?

    The primary use case for BeyondTrust is for when one needs to control the administrative accesses on their critical assets, whether that be Windows, Linux, or UNIX servers, databases, and application servers.

    What is most valuable?

    I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things that the customers are worried about when they talk about session recording.

    The other valuable feature is out-of-box connectors. BeyondTrust has partnered with many well-known companies. Other PAM products are not there yet. The number of out-of-box connectors BeyondTrust has is really good.

    What needs improvement?

    One issue, especially when you deploy HA actively and passively, is the synchronization. Usually, there is a large delay between the sync. The biggest problem is that it takes at least 14 minutes to detect that the primary is down. That is 14 minutes of downtime, which is a huge amount of time, especially for our enterprise customers. That delay should be reduced.

    The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers.

    In terms of software, BeyondTrust should work on other operating systems other than Windows and support non-Windows operating systems also.

    What do I think about the stability of the solution?

    I haven't faced any issues with stability. Others might have, but I personally haven't faced any stability issues, because the system is very solid. The processes behind them are very well defined, as well. I haven't seen any instability yet, but perhaps there might be in the future.

    What do I think about the scalability of the solution?

    Scalability is very simple. I mean you can just add a greater number of nodes or sessions. They can be behind a load balancer, so it's very easily scalable. They do need to have a license for the scalability that they wish to reach, so they can keep upgrading their hardware as much as they want.

    How are customer service and technical support?

    There are chances some customer might give very negative feedback. Firstly, we think that they are extremely good in terms of ability. Next, they give you a slot for the support. If you give a ticket they respond quickly and give you a slot. However, the customer needs to make sure that they are available for that slot. Otherwise, they can view which slots will be available soon. If they miss a slot, the technical support will get busy with other tasks. This is one reason we have had negative feedback. It comes from the customer's end. 

    As an implementer who has submitted tickets, we have gotten responses that resolve the issue. I have found that the way they communicate to resolve the issue was really good. I work with other vendors' products as well, although not for PAM. I thought that BeyondTrust support was really good.

    How was the initial setup?

    The initial setup was very straightforward and simple.

    The deployment time depends upon the size of deployment. If it's a single company with DC and DR, where you have an HA in DC and DR, the maximum time if they have 500 assets, for example, would be two weeks. If everything is smooth, it should be a maximum of two weeks. It could also be shorter.

    What about the implementation team?

    We do demonstrations for implementations only because we are partners for BeyondTrust in this region. We deploy the solution.

    Which other solutions did I evaluate?

    I've actually looked at ARCON and BeyondTrust. Now I'm working with BeyondTrust implementation.

    Features-wise, BeyondTrust is a lot better than ARCON. ARCON, even with limited features, is still good, but the number of features and scope of its privilege control is limited.

    BeyondTrust Password Safe works for critical assets and servers. For endpoints, it offers PowerBroker and Bomgar, which is for privilege remote access and control. I think that the suite of BeyondTrust covers a good landscape. ARCON is limited.

    What other advice do I have?

    Don't start the implementation until you get the prerequisite sheet confirmed from the customer. If not, you may waste a lot of time at the customer's site.

    I have learned a couple of things from this product. First, if the organization doesn't have a structured hierarchy of the work or the segregation of duties properly implemented, no matter what kind of security there is, it tends to fail. Operationally, it tends to fail. The tasks never get finished. BeyondTrust helps define those duties properly.

    That was one major thing. The other thing I learned is that PAM is not for an inexperienced person. Don't give a PAM solution to a company that is employing inexperienced people, because they will never understand the concept of security and why identity security is important.

    I would rate this solution as eight and a half or nine out of ten. I am not saying ten, only because of the limited choice of Windows. If it had alternate options available, I would give it a ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
    PeerSpot user
    PeerSpot user
    Information Security & PreSales Officer at a tech services company with 51-200 employees
    Consultant
    It allows implementing a strong workflow in the organization for accessing the most valued resources.

    What is most valuable?

    The main areas of focus of BeyondTrust products is Privileged Access Management. Along with it, they've also bundled the PAM solutions with a Vulnerability Management solution. We all know Retina Network Security Scanner has been around for more than a decade now and anybody would agree with me that it has been a most comprehensive scanner. BeyondTrust bundles these two areas of security - PAM and VM - with an extremely rich reporting & analytics platform – BeyondInsight - which gives actionable intelligence to SMBs as well as large enterprises.

    Along with PAM & VM, PBW allows implementing a strong workflow in the organization, with regards to accessing the most valued resources of the enterprise. The request-approval process along with session monitoring and recording, could prove a very strong deterrent security control for actors with malicious intent.

    With all the other features, such as asset inventory, scanning, jobs scheduling, etc., BeyondInsight offers an intelligent platform for reporting and analysis of the collected information from the customer's environment. It presents the information in the form of heat maps, risk maps, ROI graphs which are very useful for presenting to your senior executives during your budget planning. Overall, it has proven very useful to all individuals from engineer to the 'C' class of the company.

    How has it helped my organization?

    We implemented the BeyondTrust suite of products as part of our initial evaluation and continued to use the product because we liked it very much. We distribute security solutions to our customers, so we can only sell something to our customers that we believe in. And the best way to start to believe in something is to experience it. So, from the initial evaluation environment, we moved a few assets – because it's not a very large organization - and implemented a workflow process for our IT contractors. Developers and network engineers who access our infrastructure devices such as servers, routers, and firewalls have to put forth a request (though we've kept them as auto-approve 24x7, since we trust them :) ), to access the devices. All these activities are monitored, recorded & audited on a periodic basis or in cases of issues. We do not have any external auditing done within our company. However, I can imagine the kind of details provided by the solution to the auditors on almost all of the IT activities required to be monitored and audited.

    Apart from auditing & recording requirements, our sysadmin now has the best control of his work in his tenure with us, in the area of patch management for our networks. RNSS has been scheduled for periodic scan jobs preparing a report. We've configured the Enterprise Update server, which checks the vulnerabilities, suggested remediation, and once they've been reviewed, all the systems are patched directly from the Enterprise Update server.

    These are some of the areas I can think of at this point of time that we have benefited from BeyondTrust so far.

    What needs improvement?

    I'm of the thought that the best products in the market have room for improvement, always, and so is the case with this product as well. I have always submitted the improvements / bugs list to the vendor and am looking forward for them to be implemented in their coming releases.

    These are related to the Flash / Java Web UI, which we know is very vulnerable. I would love to see the Reporting & Analytics console in HTML5 or other technologies which are not as vulnerable as Flash. That's something I don’t promote for the product. However, it being an internal-facing Web application, it doesn't pose a very high risk.

    Other areas for improvement I have suggested in the past were more tight integration with some of the comprehensive ticket management systems. Currently, it does open a ticket in external ticket management system by sending an email. However, I would love to see these tickets being opened and customizable for other activities, such as after a vulnerability scan for high-impact or high-risk vulnerabilities, systems not patched for a certain time duration, and the list can go on. Auto-opening & auto-closing of tickets is something I would love to see implemented in BeyondTrust.

    For how long have I used the solution?

    I've been implementing & using BeyondTrust products for more than a year now.

    What do I think about the stability of the solution?

    I have not encountered any major stability issues so far; just a few minor bugs, such as when you run / schedule jobs, sometimes we could see two of them being run. But this was just in the UI, RNSS in the background would still run as per the configured and scheduled jobs & reporting back is also as expected. Apart from that, the product is pretty much stable.

    What do I think about the scalability of the solution?

    I've seen the product scale with no problems. I've implemented products in customers’ environments as a POC with a few servers / resources under monitoring. And once they decided to go ahead with the solution, they've scaled very well to a few hundred or thousands of users with addition of endpoint software, with virtually no impact on the performance. On the contrary, the more the resources being monitored, the more information being collected, which lights up the platform and provides a very comprehensive list of information of your network.

    How are customer service and technical support?

    Until now, there hasn’t been local direct support in Australia, so any support has to be raised via email and there is a day's lag. To speak directly to the support rep, you have to call a toll-free U.S number. However, I haven't doubted the competitiveness and efficiency of the support. All the cases I have submitted so far, for ourselves as well as our customers, have been resolved to an excellent level of satisfaction.

    Which solution did I use previously and why did I switch?

    I wasn't using any similar solution previously.

    How was the initial setup?

    The product is available in the software as well as virtual appliance form which is a hardened Windows server, shipped securely to the end-user. It does have initial setup and configuration tasks. I would not say it's simple for naive users; however, having said that, it's backed up by very strong, simple and straightforward step-by-step documentation, which is very simple to understand and can be followed by a beginner to mid-level engineer.

    What's my experience with pricing, setup cost, and licensing?

    Compared to its competitors, BeyondTrust software is way too cheap and offers many more features and functionality at the base price point. Licensing is simple and based on either number of users or number of resources, whichever is cheaper for the customer and very easy to calculate. Licenses are not hard-limited on the number of users.

    What other advice do I have?

    Security, as always, should be taken care of in a layered approach. BeyondTrust products take care of the containment of the breach with its PAM suite of solutions, as well as reducing the attack surface with its Vulnerability Management products. Together, they present a very strong, in-depth defense approach for customers. It's not an endpoint protection product, though they have their endpoint agents, which could be installed on the workstations. It has to be implemented in conjunction with other security solutions such as endpoint protection and gateway security solutions such as email & web, as well as firewalls, IDS, IPS and other network security devices.

    Disclosure: My company has a business relationship with this vendor other than being a customer: My organization is a Value Added Distributor for BeyondTrust in the APAC region.
    PeerSpot user
    PeerSpot user
    Identity and Governance Access Lead
    Real User
    The features related to application elevate is amazing.
    Pros and Cons
    • "The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
    • "Reports to the end user."

    What is most valuable?

    The features related to application elevate is amazing. It helped the company to remove almost all admin local users.

    How has it helped my organization?

    There are severals application that all users needed to have local admin configured to work. After the powerbroker implementation, all users with this privilege were removed, it improved the security and helped to change the IT vision, from Security to SAFETY.

    What needs improvement?

    Reports to the end user.

    For how long have I used the solution?

    1 year

    What was my experience with deployment of the solution?

    Not at all.

    What do I think about the stability of the solution?

    Not at all

    What do I think about the scalability of the solution?

    No.

    How are customer service and technical support?

    Customer Service:

    Very good.

    Technical Support:

    Very good

    Which solution did I use previously and why did I switch?

    No.

    How was the initial setup?

    Easy.

    What about the implementation team?

    Vendor team. Very good.

    What was our ROI?

    N/A

    What's my experience with pricing, setup cost, and licensing?

    I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions.

    Which other solutions did I evaluate?

    Yes, CyberArk, CA.

    What other advice do I have?

    No.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    General Manager, Head of Information Security at a tech services company with 51-200 employees
    Reseller
    Good authentification but offers poor technical support and is rather pricey
    Pros and Cons
    • "BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
    • "Their technical support could be more responsive and helpful."

    What is our primary use case?

    We primarily offer this solution to our clients. Our clients use it for access. For example, if there is a user who is not from their existing network and he's a contractor, they have to be able to give him the privilege to come inside, otherwise, that person can't access anything internally like a regular end user can. This solution allows them to offer separate privileged user access for specific users. 

    What is most valuable?

    The solution is very fast.

    The solution offers good authentification. It makes managing passwords and access easy and ensures that access is granted only to respective people and/or organizations.

    BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc.

    What needs improvement?

    There are different vendors that are pretty competitive in terms of features. BeyondTrust is great in some areas, however, CyberArk is as well. The solution needs to continue to add features in order to stay competitive in the market.

    Their technical support could be more responsive and helpful.

    The solution is quite expensive.

    For how long have I used the solution?

    I've been using this solution for one year now.

    What do I think about the stability of the solution?

    We don't have any issues with stability. It doesn't crash or freeze. It's not buggy.

    What do I think about the scalability of the solution?

    The solution offers good scalability and is easy to upgrade as needed.

    How are customer service and technical support?

    While I've never been in touch with technical support, my team has in the past.

    They can improve their services. That's my understanding based on the feedback I've heard. They are a Gartner leader, and due to this accolade, sometimes they can get a bit lazy when it comes to giving the right support. They are a leader so they take advantage. There are a lot of deals which we have lost due to this kind of attitude.

    There are been cases that we are handling that have been going on for a year now. Even though they are an industry leader, they haven't been able to solve a small problem. We have the American University of Dubai struggling to solve a small problem, and it's been one year since one case has been opened with BeyondTrust, and they're not able to solve it. That's far too long.

    How was the initial setup?

    The initial set up is quite quick. BeyondTrust implementation does not take much time. However, it depends on the complexity of the client. It'll take months sometimes if the customer does not know their requirements. For example, a basic implementation takes 10 to 15 days. However, if there is more access needed it takes months sometimes. Access has to be defined based on the number of end-users. It may take as long as four months or so.

    What's my experience with pricing, setup cost, and licensing?

    The cost of the solution is very high. As a market leader, they tend to charge a premium. They only provide the product. Technical support is extra, if a company wants to have access to that.

    What other advice do I have?

    Overall, I'd rate the solution five out of ten.

    I would definitely recommend it, however, I would recommend organizations test a couple of solutions based on their requirements. There will be a different requirement for a retail outlet and a different requirement for an oil and gas company. 

    Even though it is privileged remote access, different accesses most likely need to be granted. If somebody is a software developer, and somebody is just for support, they will need different types of access. Whether this solution offers that a company needs depends on different requirements from different end-users.

    Disclosure: My company has a business relationship with this vendor other than being a customer: Distributor
    PeerSpot user
    VP Cyber Risk at a tech services company with 501-1,000 employees
    Real User
    Good for meeting compliance objectives but it has a complex setup
    Pros and Cons
    • "The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."

      What is our primary use case?

      In terms of meeting compliance objectives of securing endpoints, this product is very useful. It works for things like ISO, PCI, DSS, and the CIA. BeyondTrust meets all of the technical requirements from the compliance perspective. The vault, remote access management, and VP enlisted VPNs will become very useful in terms of being able to manage and maintain infrastructure security without having the complexities of changing passwords all of the time. It also helps to maintain all of the compliance objectives with password complexity changes. All of those things get managed under one product tree.

      What is most valuable?

      The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file.

      What needs improvement?

      This depends on the client. Some clients find the granular approach a lot better than the simplified approach and some clients prefer the simplified approach better than the granular approach. Depending on the type of organization and type of information that must be protected, there are obviously different requirements.

      For how long have I used the solution?

      I actually haven't been using this solution. Customers of mine have been using it for about three years to provide me with evidence for audit purposes. They retrieved this evidence from BeyondTrust. When I ask them about endpoint management, all the information that I ask for they pull out of BeyondTrust. 

      What do I think about the stability of the solution?

      At this point in time, I haven't had any complaints from clients that it let them down, so I would assume it's stable.

      What do I think about the scalability of the solution?

      It is definitely scalable. I've worked with clients that have a 75,000-device network and it's working fine. Our clients have anywhere from about 15,000 users up to about 40,000 users.

      How was the initial setup?

      The initial setup is complex.

      What about the implementation team?

      We use a vendor team to implement.

      What other advice do I have?

      Approach it slowly. Don't rush in and drop things down there. Do it carefully, because you might end up breaking access to systems, which is complicated when you're running a production environment. Make sure you go through the testing process vigorously before you deploy.

      I would give BeyondTrust a seven out of ten. There are some features in CyberArk that are better, cheaper, or easier to implement. Some of those running in CyberArk don't have the conflicts that BeyondTrust has, as there are many products in the suite. You've got to compare apples with apples.

      Which deployment model are you using for this solution?

      On-premises
      Disclosure: I am a real user, and this review is based on my own experience and opinions.
      PeerSpot user
      Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
      Reseller
      Good asset discovery and management capability
      Pros and Cons
      • "The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
      • "The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does."

      What is our primary use case?

      We are a technical services company and this is one of the solutions that we provide for our clients. It is used to manage privileged access for our customers and their server resources.

      One of our customers had administrators that shared credentials to access some of their enterprise applications. We needed to remove those credentials because they were compromised at some point, leaving other people to access them and the organization was not able to keep track of who was logging in, or what they were doing at any particular point in time. Implementing this solution has allowed us to remove most of the credentials from those applications move them into a proper management facility.

      What is most valuable?

      The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager.

      What needs improvement?

      The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does. This would help because sometimes, you can get lost and you find yourself going back to see what the functions do. Have at least a very small hint for some of the key functions would go a long way to help with deploying and using the system.

      Better pricing would help this solution to grow in the Nigerian market.

      For how long have I used the solution?

      I have been using BeyondTrust Endpoint Privilege Management for just less than three years.

      What do I think about the stability of the solution?

      This is a stable solution.

      What do I think about the scalability of the solution?

      Our customers have been relying on what they have, and thus there has been no reason to scale.

      How are customer service and technical support?

      We have been in touch with technical support and we are satisfied with them.

      Which solution did I use previously and why did I switch?

      We offer a variety of competing solutions to our clients, such as CyberArk. In general, the competitors are cheaper in price. I have not personally used other solutions because it was BeyondTrust that brought me into the privileged access management realm.

      How was the initial setup?

      The initial setup is a bit complex and not particularly straightforward. Deploying this solution for the first time took about a month.

      What about the implementation team?

      Our in-house team handled the deployment.

      What's my experience with pricing, setup cost, and licensing?

      This solution is expensive compared to its competitors.

      What other advice do I have?

      This is a good solution that I would recommend, but in the Nigerian market, the price of this solution is challenging. Many companies are choosing competing solutions like CyberArk because the cost is lower. If the price were more friendly then it would have a better share of the market.

      I would rate this solution an eight out of ten.

      Which deployment model are you using for this solution?

      On-premises
      Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
      PeerSpot user
      Buyer's Guide
      Download our free BeyondTrust Endpoint Privilege Management Report and get advice and tips from experienced pros sharing their opinions.
      Updated: May 2024
      Buyer's Guide
      Download our free BeyondTrust Endpoint Privilege Management Report and get advice and tips from experienced pros sharing their opinions.