Team Lead, Network Infrastructure Business at a tech services company with 51-200 employees
Reseller
Offers good stability and asset discovery makes it easy to pull assets into the database of the solution manager
Pros and Cons
  • "The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
  • "The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."

What is our primary use case?

At one point, our users shared credentials to access some enterprise applications within our environment. We had to take off user credentials because those credentials were getting compromised at one point. We also had trouble keeping track of who logged in or when people were doing work at any given period of time. With this solution, we're able to log the credentials from those applications and then move it into the facility for proper credential management.

What is most valuable?

The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager.

What needs improvement?

The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process.

For how long have I used the solution?

I've been using the solution for less than three years.

Buyer's Guide
BeyondTrust Endpoint Privilege Management
May 2024
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,394 professionals have used our research since 2012.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

I can't say how scalable the solution is because I don't have too much experience in the matter. For how we are currently using it, we haven't had a reason to scale the solution. Our customers would know better, but it's my sense that BeyondTrust offers much more access compared to a competitor like CyberArk.

Which solution did I use previously and why did I switch?

We didn't previously use a different solution.

How was the initial setup?

The initial process is not straightforward. It's a bit complex. Deployment took about a month for us.

What about the implementation team?

We handled the deployment in-house with the help of our own team.

What's my experience with pricing, setup cost, and licensing?

The pricing is quite high.

Which other solutions did I evaluate?

We didn't evaluate other options. We were already using BeyondTrust and it seemed a natural extension to add this solution as well.

What other advice do I have?

We're a BeyondTrust reseller.

I'd recommend the solution. However, the pricing is not competitive and I find in the Nigerian market we're losing ground to CyberArk because the pricing is so unfriendly for the region. They need to try and match their competitors here in order to stay competitive overall in the market.

I'd rate the solution eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
PeerSpot user
Senior Technical Consultant at a tech services company with 1,001-5,000 employees
Real User
Simplifies server access without password distribution

How has it helped my organization?

Simplifies server access without password distribution.

What is most valuable?

Password management, as it is a core function; passwords are a frequent hacking point.

What needs improvement?

All products have room to improve. I would like to see support for many more systems, such as AS400.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

No issues with stability.

What do I think about the scalability of the solution?

I have not had a chance to scale out.

How is customer service and technical support?

My support has come from the sales engineering team, not the support team, and I would rate the support at nine out of 10.

How was the initial setup?

For a production environment, the setup is easy. For a PoC it is a different scenario.

What other advice do I have?

Take care regarding the SQL database.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
BeyondTrust Endpoint Privilege Management
May 2024
Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,394 professionals have used our research since 2012.
Consultant- Information Security at a tech services company with 11-50 employees
Consultant
Monitors all infrastructure activities but program updates are very rare and it gets buggy
Pros and Cons
  • "The implementation is quite easy because the documents are always online."
  • "The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."

What is our primary use case?

Our primary use case of this solution is data access management. When you have a complex infrastructure you obviously need a solution that can monitor the activities that are going on in the infrastructure. The usernames, passwords, and activities have to be monitored, and this program helps you with that.

So it is nothing but a monitoring and security tool that will monitor all the infrastructure activities and help you to manage the passwords of the infrastructure so that the passwords are not being exposed to the third parties or your users. These passwords will be secure in your infrastructure and be rotated as part of the compliance policies.

What needs improvement?

There are a few points that are lagging in the technology and I think updated versions should be available more frequently.

So the program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features. 

For how long have I used the solution?

I have been working on BeyondTrust Endpoint Privilege Management for about three years now.

What do I think about the stability of the solution?

BeyondTrust is lagging on stability because it is a merger with Bomgar and so there are three, four technologies included in that. So the stability is still not how it should be.

What do I think about the scalability of the solution?

The program is scalable. It is reliable and to be deployed in a complex infrastructure, will be no problem. It can handle the load. Almost all our clients are enterprise level. So we have good partners and clients with enterprise architecture and complex infrastructure.

How was the initial setup?

The implementation is quite easy because the documents are always online. So you can do the installation yourself. But it is always better to have certified engineers to do the implementation so that you can design the infrastructure in a more secure way. When you have certified engineers, they have their own strategies to do the implementation, which is good in the long run. The deployment, however, is easy and very straightforward.

For a program like this, you want your infrastructure to be stable for more than five years or 10 years. So when you do the deployment with the help of certified engineers, they will have their own strategy of doing the installation and implementation so that managing the operations of such solutions will be easy for you. Yes, you can do the installation on your own, but it is always better to have some certified engineers.

What other advice do I have?

This program has a good reputation in the market and it is more required for the security of your infrastructure. It is a product that you can trust. The only thing I'm looking for in the next version is that the bug fixes have to be more frequent and the solution has to be more reliable and more flexible. On a scale from one to 10, I'll give it a six.

Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
Senior Technical Consultant at a tech services company with 1,001-5,000 employees
Real User
It scales easily and the product is stable
Pros and Cons
  • "It scales easily and the product is stable."
  • "It should support XWindows Remote Desktop Access protocol for Linux/Unix."

What is our primary use case?

We use it for the password management (of privileged password management).

What is most valuable?

Privileged password management.

What needs improvement?

It should support XWindows Remote Desktop Access Protocol for Linux/Unix.

I would like more connectors for other security software/systems. A password is needed to access their security systems.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

No stability issues.

What do I think about the scalability of the solution?

It scales easily.

How are customer service and technical support?

I would rate their technical support as a nine out of 10. I have a technical support contact in Singapore.

Which solution did I use previously and why did I switch?

We did not previously use another solution.

How was the initial setup?

The initial setup was easy.

What other advice do I have?

For a Windows/Linux/Unix mixed environment, it is a good product to management privilege account passwords to prevent security breaches.

Disclosure: My company has a business relationship with this vendor other than being a customer: Distributor.
PeerSpot user
Buyer's Guide
Download our free BeyondTrust Endpoint Privilege Management Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2024
Buyer's Guide
Download our free BeyondTrust Endpoint Privilege Management Report and get advice and tips from experienced pros sharing their opinions.