We performed a comparison between BeyondTrust Endpoint Privilege Management and Check Point Harmony Endpoint based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"The solution's technical support is good."
"Logs that get collected on the Privilege Management console from the agents are very good. They help us to identify the aspects from which we have to whitelist an application."
"Technical support is good."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"It scales easily and the product is stable."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"It has a great ability to detect threats and keep us safe."
"In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations."
"It's pretty complete for preventing threats to endpoints. Its capabilities are great."
"It's great for securing our endpoints from any external attacks."
"The most valuable feature of this solution is the VPN."
"We have found the stability to be very reliable."
"The security is its most valuable feature."
"A unique feature with this product is that it will detect if the user is entering their password on a website, and then block it."
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"The product should improve its price."
"It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then."
"Its feature for establishing workflows needs improvement."
"Reports to the end user."
"The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"How the accounts are presented in the solution's UI can be improved."
"The patch management and upgrades are not timely."
"We did have some early compatibility issues, which I hope Check Point has since resolved."
"The solution can be made lightweight in order to keep the systems more effective during the background operations of the scanning and security checks."
"We have observed some policies are not working as expected."
"Support's service and the response times can be improved. The triaging of the tickets takes a long time and the tickets are only resolved with escalations."
"The price of the product could be more friendly."
"It would be useful if you could also mark blocks as safe from a client. Now users always have to ask an admin to make exclusions."
"The next release should consider a strong threat detection mechanism that can categorize various levels of attacks for faster analysis."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Check Point Harmony Endpoint is ranked 8th in EPP (Endpoint Protection for Business) with 99 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Check Point Harmony Endpoint is rated 8.8. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business, SentinelOne Singularity Complete and Cortex XDR by Palo Alto Networks.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.