Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
Next year, we may add another BeyondTrust element because the overall experience has been good.
One person gets aligned for troubleshooting and maintenance activities during their downtime, and within an hour, they complete these tasks.
The tickets for minor issues have been resolved efficiently.
I found the technical support from BeyondTrust to be very good.
BeyondTrust Password Safe is scalable and stable from my perspective, as if you increase your CPU and RAM, you can use as many user licenses as you want on a single platform.
If using the built-in database, it requires good knowledge in Microsoft SQL, which could complicate scalability.
In my experience, the scalability of BeyondTrust Password Safe is also a nine.
The solution is very stable.
SaaS-based applications and other things should be included, along with their password management options for web applications.
There are limitations when accessing or creating connectors for each application.
This would help in identifying suspicious activities immediately when users log in.
My experience with the pricing, setup cost, and licensing of BeyondTrust Password Safe is good because we have an asset-based license, not a user-based one, allowing us to add many clients with privilege access.
Pricing is managed by a different team, however, I know it's less expensive than CyberArk Privilege Access.
It is cost-effective compared to other solutions.
The most effective features of BeyondTrust Password Safe are password management and session recording.
The most valuable feature of BeyondTrust Password Safe is the Privilege Access Management control, and the session monitoring is particularly useful for mitigating risk.
The flexibility of the licensing model is significantly better as it offers both unlimited users and unlimited devices, unlike Delinea, which is based on the number of users.
Axiad Conductor offers a user-friendly platform for managing multifactor authentication and credential lifecycle, supporting seamless transitions to cloud environments for enhanced security compliance and access control.
Axiad Conductor stands out with intuitive management of multifactor authentication systems, assertive device lifecycle management, and a managed cloud solution that streamlines operations. It promotes user self-service for credential updates, minimizing the need for extensive training. With the capability to handle large networks, it enhances efficiency while meeting contract demands. Addressing user suggestions, plans include interface design updates and Canadian hosting, although macOS's frequent updates pose integration challenges.
What are the principal features of Axiad Conductor?In diverse industries, Axiad Conductor is implemented to manage multifactor authentication and PKI elements like smart cards and YubiKeys. Organizations leverage it to ensure compliance, facilitate secure workforce access, and transition PKI systems to the cloud, handling substantial volumes of smart card and machine certificates with ease.
Beyond Trust Password Safe is an automated solution that combines password and privileged session management into a single platform. Password Safe delivers secure access control, auditing, alerting, recording, and monitoring.
This free and open-source password manager supports Windows and Linux, and some ports are available for other platforms as well. Their proprietary algorithm, Twofish, is considered highly secure, with the advantage that it is not affiliated with NIST. The Twofish algorithm secures the data while keys are delivered using SHA-256 authentication.
The application is easy to use, and you can download the Windows app from several sites. Additionally, the application is available in 14 languages.
Beyond Trust Password Safe Key Features
What can you do with Password Safe?
Beyond Trust Password Safe Benefits
Reviews from Real Users
A PAM Architect at a tech services company says, "BeyondTrust Password Safe's features that I have found most valuable are really those that are knitted in. That is their Smart Rules and Smart Groups, where you design your administration model so you create your AD groups and your asset groups, and configure Password Safe."
An I.S. Architect at a insurance company mentions that "Session recording, password rotation, and password vaulting are the most valuable features."
"One of the most valuable features is that this is a product designed with enterprises in mind," adds a Cybersecurity Architect at a tech vendor.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.