Try our new research platform with insights from 80,000+ expert users
BeyondTrust Endpoint Privilege Management Logo

BeyondTrust Endpoint Privilege Management Reviews

Vendor: BeyondTrust
4.0 out of 5
1,987 followers
Start review

What is BeyondTrust Endpoint Privilege Management?

Featured BeyondTrust Endpoint Privilege Management reviews

BeyondTrust Endpoint Privilege Management mindshare

Product category:
As of May 2025, the mindshare of BeyondTrust Endpoint Privilege Management in the Privileged Access Management (PAM) category stands at 3.8%, down from 5.3% compared to the previous year, according to calculations based on PeerSpot user engagement data.
Privileged Access Management (PAM)

PeerResearch reports based on BeyondTrust Endpoint Privilege Management reviews

TypeTitleDate
CategoryPrivileged Access Management (PAM)May 27, 2025Download
ProductReviews, tips, and advice from real usersMay 27, 2025Download
ComparisonBeyondTrust Endpoint Privilege Management vs CyberArk Privileged Access ManagerMay 27, 2025Download
ComparisonBeyondTrust Endpoint Privilege Management vs Delinea Secret ServerMay 27, 2025Download
ComparisonBeyondTrust Endpoint Privilege Management vs One Identity SafeguardMay 27, 2025Download
Suggested products
TitleRatingMindshareRecommending
Microsoft Defender for Endpoint4.1N/A94%197 interviewsAdd to research
CyberArk Privileged Access Manager4.318.3%94%223 interviewsAdd to research
 
 
Key learnings from peers

Valuable Features

Room for Improvement

ROI

Pricing

Popular Use Cases

Service and Support

Deployment

Scalability

Stability

Review data by company size

By reviewers
By visitors reading reviews

Top industries

By visitors reading reviews
Financial Services Firm
18%
Computer Software Company
14%
Manufacturing Company
10%
Government
7%
Comms Service Provider
4%
Real Estate/Law Firm
4%
Healthcare Company
4%
Educational Organization
4%
University
3%
Construction Company
3%
Energy/Utilities Company
3%
Retailer
3%
Insurance Company
3%
Hospitality Company
2%
Outsourcing Company
2%
Wholesaler/Distributor
1%
Legal Firm
1%
Media Company
1%
Non Profit
1%
Pharma/Biotech Company
1%
Transportation Company
1%
Performing Arts
1%
Recreational Facilities/Services Company
1%
Consumer Goods Company
1%
Aerospace/Defense Firm
1%
Logistics Company
1%
Mining And Metals Company
1%

Compare BeyondTrust Endpoint Privilege Management with alternative products

Learn more about BeyondTrust Endpoint Privilege Management

BeyondTrust Endpoint Privilege Management customers

Related questions

 

BeyondTrust Endpoint Privilege Management reviews

Sort by:
Prashant Uppuluri - PeerSpot user
Solution Architect at FVC
Verified user of BeyondTrust Endpoint Privilege Management
Jan 15, 2025
Provides critical application control and ensures security with a flexible setup process

Pros

"Administrators need a tool that provides visibility and clarity about endpoint management within the organization. This addresses the issue of managing privileged users, which is crucial for any administrator or higher management team to control. "

Cons

"Improvements could focus on adding more AI features to automate processes that are currently manual or challenging for end users."
PM
CEO at a non-tech company with 11-50 employees
Verified user of BeyondTrust Endpoint Privilege Management
Apr 5, 2025
Users experience improved security with flexible deployment options

Pros

"The user experience is good, and there are many preconfigured platforms."

Cons

"There is a need for better MQ integration with DevOps and improvements in architecture. "
Find out what your peers are saying about BeyondTrust Endpoint Privilege Management. Updated May 2025
852,852 professionals have used our research since 2012.
Marlin B Pohlman - PeerSpot user
Consultant at Visdom
Verified user of BeyondTrust Endpoint Privilege Management
Nov 15, 2022
Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us

Pros

"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."

Cons

"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product. "
PeerSpot user
Sr. Manager Cyber Security at a manufacturing company with 10,001+ employees
Verified user of BeyondTrust Endpoint Privilege Management
Feb 22, 2022
A simple and flexible solution for controlling the access and improving the security posture

Pros

"The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us."

Cons

"Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful."
Muhammad Baber - PeerSpot user
System Administrator at Alghanim Industries
Verified user of BeyondTrust Endpoint Privilege Management
May 21, 2024
Provides stable and secure remote access to assets in the organization

Pros

"The product is secure."

Cons

"We faced some challenges with remote desktop sessions."
PeerSpot user
Senior Specialist at a tech services company with 10,001+ employees
Verified user of BeyondTrust Endpoint Privilege Management
Nov 30, 2022
Improves security and provides the flexibility to meet the needs of users for application installation

Pros

"Logs that get collected on the Privilege Management console from the agents are very good. They help us to identify the aspects from which we have to whitelist an application."

Cons

"It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then. "
Mohammed-Talukdar - PeerSpot user
Lead Cyber Security Architect at a tech services company with 10,001+ employees
Verified user of BeyondTrust Endpoint Privilege Management
Sep 24, 2023
Provides stable performance and integration capabilities with various applications and the Windows operating system.

Pros

"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system. "

Cons

"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months. "
Pradeep Swain - PeerSpot user
Information Technology System Analyst at a tech services company with 1,001-5,000 employees
Verified user of BeyondTrust Endpoint Privilege Management
Jun 12, 2023
Valuable for coding activities and highly scalable solution

Pros

"Scalability is good. I would rate the scalability a nine out of ten. "

Cons

"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult. "