Try our new research platform with insights from 80,000+ expert users

Acronis Cyber Protect Home Office vs BeyondTrust Endpoint Privilege Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Acronis Cyber Protect Home ...
Ranking in Anti-Malware Tools
22nd
Average Rating
8.8
Reviews Sentiment
6.7
Number of Reviews
4
Ranking in other categories
Backup and Recovery (40th)
BeyondTrust Endpoint Privil...
Ranking in Anti-Malware Tools
13th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
32
Ranking in other categories
Privileged Access Management (PAM) (9th)
 

Mindshare comparison

As of January 2026, in the Anti-Malware Tools category, the mindshare of Acronis Cyber Protect Home Office is 0.8%, up from 0.7% compared to the previous year. The mindshare of BeyondTrust Endpoint Privilege Management is 0.8%, down from 1.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Anti-Malware Tools Market Share Distribution
ProductMarket Share (%)
BeyondTrust Endpoint Privilege Management0.8%
Acronis Cyber Protect Home Office0.8%
Other98.4%
Anti-Malware Tools
 

Featured Reviews

GR
General Manager at Tilaknagar Industries Ltd
Reliable backups have protected our manufacturing data and now provide confident disaster recovery
Acronis Cyber Protect Home Office is used to take care of the data for our manufacturing company and its users. I work with CrowdStrike only for antivirus. We have antivirus products, but not as a main solution. The antiviruses we are using are from another vendor. For antiviruses, we are using Falcon CrowdStrike. My main experience is with CrowdStrike antivirus and Palo Alto firewall. These are the two things for security, and we are exploring other software solutions that will be beneficial for us. I track two levels of ransomware protection: one from Acronis Cyber Protect Home Office and one from CrowdStrike. I do not work with Cortex cloud by Palo Alto; I have the hardware on-premise at my location. I do not work with WildFire, Prisma Access, or Prisma SD-WAN, but I will be looking forward to it. This is the only firewall I am using, but very soon, I will be opting for another Palo Alto firewall of the same model that will be working on high availability. I am not knowledgeable about the CN-Series firewall; I can only talk about the one I have. We have acquired one particular brand, a company called Pernod Ricard, which manufactures products like Chivas Regal whisky and Beefeater. Endpoint Detection and Response is something we will explore after a certain period of time and we are looking for it very soon. I would rate this review an overall eight out of ten.
Md Abdul Hakim - PeerSpot reviewer
System Engineer at Corporate Projukti Limited
Offers solid performance and user adaptability but needs better pricing options and local support
BeyondTrust is a strong, compliance-driven solution with excellent market recognition (Gartner, Peers, etc.), making it appealing for Bangladeshi enterprises. However, some key improvements could accelerate adoption: Areas for Improvement: Pricing & Local Affordability While the product’s capabilities justify its value, cost remains a barrier for many Bangladeshi organizations. Competitive pricing or regional discounts would make it more accessible. Local Support & Partnerships Currently, lack of local partners or trainers creates delays in support, implementation, and pricing negotiations. Establishing a Bangladesh-based support team or authorized resellers would improve responsiveness and trust. Enhanced Onboarding & Training Offering localized training programs (in Bengali/English) and documentation would help IT teams deploy and manage the solution more efficiently. Recommendations for Next Release: Introduce tiered pricing for emerging markets like Bangladesh. Develop a partner network in Bangladesh for faster service and sales. Add simplified dashboards for easier monitoring by non-technical staff. Final Note: BeyondTrust is already a top-tier PAM solution, but addressing these gaps would solidify its leadership in Bangladesh’s growing cybersecurity market.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"When it comes to backup, the biggest benefits of Acronis Cyber Protect Home Office are its reliability and the assurance it provides, which we have specifically tried and tested during disasters as it saved us from losing data."
"The malware feature is most valuable."
"The customer service and support are excellent."
"The reliable tool allows for quick restoration from backup copies, meaning I do not have to reload Windows or programs."
"Acronis schedules in the background and does incremental images so it doesn’t take forever to backup."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"The user experience is good, and there are many preconfigured platforms."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"AI adds value by automating the onboarding of assets and using smart rules to assign privileges."
"I find the solution’s features like section management, password management, and analytics valuable."
"The solution's technical support is good."
 

Cons

"I originally intended to use Acronis for cloud backup, however, the cloud backup had major problems."
"Acronis Cyber Protect Home Office needs to improve their reporting part, and the support provided is sometimes inadequate, which causes issues for customers."
"I had a couple of false positives, but that’s it."
"The configuration needs improvement."
"I originally intended to use Acronis for cloud backup, however, the cloud backup had major problems. After struggling with it for about two years, I switched to Carbonite and have not gone back."
"If they improve their price in Bangladesh, since they do not have local partners or local trainers, clients or integrators find it difficult to reach BeyondTrust for support, service, and price quotation."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"There is a need for better MQ integration with DevOps and improvements in architecture."
"If you don't get the implementation right at the outset, you will struggle with the product."
"There is a need for better MQ integration with DevOps and improvements in architecture."
"The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
 

Pricing and Cost Advice

Information not available
"What BeyondTrust was providing was user-based licensing which was a great benefit from the client point of view. Recently, I don't know why, the licensing model has been changed, and that is the reason that they have lost a bit of their edge when it comes to the PAM, against our competition. The asset-based licensing, from the user's point of view, is not beneficial. The licensing should be based on the users. The greater the number of users, the greater will be the load and the greater the scalability problems. I presume that is why the licensing model has changed."
"PowerBroker for a Mac client is three times the price of the Windows version."
"The product’s licensing is different for Windows, Linux, and Mac. The tool’s licensing is yearly."
"Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
"This solution is expensive compared to its competitors."
"The solution's pricing is high."
"It is relatively more cost-effective compared to the competing product."
"Its pricing and licensing are okay. We were in the perpetual model when it was on-prem, and now, with the SaaS service, we have a subscription model. As a customer, I would always like to see a lower price, but it seems to be priced at the right model currently, and we are trying to get the maximum benefits out of it."
report
Use our free recommendation engine to learn which Anti-Malware Tools solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
35%
Computer Software Company
9%
Manufacturing Company
8%
Financial Services Firm
8%
Financial Services Firm
18%
Manufacturing Company
10%
Computer Software Company
9%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise3
Large Enterprise15
 

Questions from the Community

What needs improvement with Acronis Cyber Protect Home Office?
I originally intended to use Acronis for cloud backup, however, the cloud backup had major problems. After struggling with it for about two years, I switched to Carbonite and have not gone back.
What is your primary use case for Acronis Cyber Protect Home Office?
I use Acronis for backups. I use it to back up to other drives on the network, back up the entire system, including system images of the Windows C drive and all the data drives. This is for a small...
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
BeyondTrust's pricing is premium but negotiable for Bangladesh. Expect 20-30% extra costs from currency/import factors. Start with modular licensing (EPM first), demand emerging market discounts, a...
 

Also Known As

No data available
BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
 

Overview

 

Sample Customers

Information Not Available
Aera Energy LLC, Care New England, James Madison University
Find out what your peers are saying about Acronis Cyber Protect Home Office vs. BeyondTrust Endpoint Privilege Management and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.