No more typing reviews! Try our Samantha, our new voice AI agent.

Acronis Cyber Protect Home Office vs BeyondTrust Endpoint Privilege Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Acronis Cyber Protect Home ...
Ranking in Anti-Malware Tools
22nd
Average Rating
8.8
Reviews Sentiment
6.7
Number of Reviews
4
Ranking in other categories
Backup and Recovery (37th)
BeyondTrust Endpoint Privil...
Ranking in Anti-Malware Tools
15th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
32
Ranking in other categories
Privileged Access Management (PAM) (7th)
 

Mindshare comparison

As of May 2026, in the Anti-Malware Tools category, the mindshare of Acronis Cyber Protect Home Office is 0.9%, up from 0.7% compared to the previous year. The mindshare of BeyondTrust Endpoint Privilege Management is 0.9%, down from 1.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Anti-Malware Tools Mindshare Distribution
ProductMindshare (%)
BeyondTrust Endpoint Privilege Management0.9%
Acronis Cyber Protect Home Office0.9%
Other98.2%
Anti-Malware Tools
 

Featured Reviews

GR
General Manager at Tilaknagar Industries Ltd
Reliable backups have protected our manufacturing data and now provide confident disaster recovery
Acronis Cyber Protect Home Office is used to take care of the data for our manufacturing company and its users. I work with CrowdStrike only for antivirus. We have antivirus products, but not as a main solution. The antiviruses we are using are from another vendor. For antiviruses, we are using Falcon CrowdStrike. My main experience is with CrowdStrike antivirus and Palo Alto firewall. These are the two things for security, and we are exploring other software solutions that will be beneficial for us. I track two levels of ransomware protection: one from Acronis Cyber Protect Home Office and one from CrowdStrike. I do not work with Cortex cloud by Palo Alto; I have the hardware on-premise at my location. I do not work with WildFire, Prisma Access, or Prisma SD-WAN, but I will be looking forward to it. This is the only firewall I am using, but very soon, I will be opting for another Palo Alto firewall of the same model that will be working on high availability. I am not knowledgeable about the CN-Series firewall; I can only talk about the one I have. We have acquired one particular brand, a company called Pernod Ricard, which manufactures products like Chivas Regal whisky and Beefeater. Endpoint Detection and Response is something we will explore after a certain period of time and we are looking for it very soon. I would rate this review an overall eight out of ten.
Md Abdul Hakim - PeerSpot reviewer
System Engineer at Corporate Projukti Limited
Offers solid performance and user adaptability but needs better pricing options and local support
BeyondTrust is a strong, compliance-driven solution with excellent market recognition (Gartner, Peers, etc.), making it appealing for Bangladeshi enterprises. However, some key improvements could accelerate adoption: Areas for Improvement: Pricing & Local Affordability While the product’s capabilities justify its value, cost remains a barrier for many Bangladeshi organizations. Competitive pricing or regional discounts would make it more accessible. Local Support & Partnerships Currently, lack of local partners or trainers creates delays in support, implementation, and pricing negotiations. Establishing a Bangladesh-based support team or authorized resellers would improve responsiveness and trust. Enhanced Onboarding & Training Offering localized training programs (in Bengali/English) and documentation would help IT teams deploy and manage the solution more efficiently. Recommendations for Next Release: Introduce tiered pricing for emerging markets like Bangladesh. Develop a partner network in Bangladesh for faster service and sales. Add simplified dashboards for easier monitoring by non-technical staff. Final Note: BeyondTrust is already a top-tier PAM solution, but addressing these gaps would solidify its leadership in Bangladesh’s growing cybersecurity market.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The reliable tool allows for quick restoration from backup copies, meaning I do not have to reload Windows or programs."
"The malware feature is most valuable."
"When it comes to backup, the biggest benefits of Acronis Cyber Protect Home Office are its reliability and the assurance it provides, which we have specifically tried and tested during disasters as it saved us from losing data."
"The customer service and support are excellent."
"Acronis schedules in the background and does incremental images so it doesn’t take forever to backup."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"The features related to application elevate is amazing, and it helped the company to remove almost all admin local users."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"Scalability is good. I would rate the scalability a nine out of ten."
 

Cons

"Acronis Cyber Protect Home Office needs to improve their reporting part, and the support provided is sometimes inadequate, which causes issues for customers."
"The configuration needs improvement."
"I originally intended to use Acronis for cloud backup, however, the cloud backup had major problems. After struggling with it for about two years, I switched to Carbonite and have not gone back."
"I originally intended to use Acronis for cloud backup, however, the cloud backup had major problems."
"I had a couple of false positives, but that’s it."
"We faced some challenges with remote desktop sessions."
"Its feature for establishing workflows needs improvement."
"If they improve their price in Bangladesh, since they do not have local partners or local trainers, clients or integrators find it difficult to reach BeyondTrust for support, service, and price quotation."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"If you don't get the implementation right at the outset, you will struggle with the product."
"They are doing good for now, but they should start to consider tight integration with Mac solutions."
"Improvements could focus on adding more AI features to automate processes that are currently manual or challenging for end users."
"There is a need for better MQ integration with DevOps and improvements in architecture."
 

Pricing and Cost Advice

Information not available
"Its pricing and licensing are okay. We were in the perpetual model when it was on-prem, and now, with the SaaS service, we have a subscription model. As a customer, I would always like to see a lower price, but it seems to be priced at the right model currently, and we are trying to get the maximum benefits out of it."
"What BeyondTrust was providing was user-based licensing which was a great benefit from the client point of view. Recently, I don't know why, the licensing model has been changed, and that is the reason that they have lost a bit of their edge when it comes to the PAM, against our competition. The asset-based licensing, from the user's point of view, is not beneficial. The licensing should be based on the users. The greater the number of users, the greater will be the load and the greater the scalability problems. I presume that is why the licensing model has changed."
"It was very expensive."
"This solution is expensive compared to its competitors."
"Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten."
"It is relatively more cost-effective compared to the competing product."
"I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions."
report
Use our free recommendation engine to learn which Anti-Malware Tools solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
28%
Financial Services Firm
10%
Manufacturing Company
9%
Computer Software Company
6%
Financial Services Firm
15%
Manufacturing Company
9%
Government
8%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise3
Large Enterprise15
 

Questions from the Community

What needs improvement with Acronis Cyber Protect Home Office?
Acronis Cyber Protect Home Office needs to improve their reporting part, and the support provided is sometimes inadequate, which causes issues for customers. The technical support from the third pa...
What is your primary use case for Acronis Cyber Protect Home Office?
Acronis Cyber Protect Home Office is used to take care of the data for our manufacturing company and its users. We are just exploring ourselves in cybersecurity, and it will take time for us to mat...
What advice do you have for others considering Acronis Cyber Protect Home Office?
Acronis Cyber Protect Home Office is used to take care of the data for our manufacturing company and its users. I work with CrowdStrike only for antivirus. We have antivirus products, but not as a ...
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
BeyondTrust's pricing is premium but negotiable for Bangladesh. Expect 20-30% extra costs from currency/import factors. Start with modular licensing (EPM first), demand emerging market discounts, a...
What needs improvement with BeyondTrust Endpoint Privilege Management?
In future updates of BeyondTrust Endpoint Privilege Management, I would prefer to see features for Password Safe and VPN access, as we have applications for that. Technical support for BeyondTrust ...
 

Also Known As

No data available
BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
 

Overview

 

Sample Customers

Information Not Available
Aera Energy LLC, Care New England, James Madison University
Find out what your peers are saying about Acronis Cyber Protect Home Office vs. BeyondTrust Endpoint Privilege Management and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.