We performed a comparison between BeyondTrust DevOps Secrets Safe and BeyondTrust Endpoint Privilege Management based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The local administrator can manage all the user's logins in one, simple, straight-away account access. Additionally, the solution is user-friendly."
"DevOps Secrets Safe allows you to customize a lot of rules."
"The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix."
"A sophisticated and mature solution."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"It scales easily and the product is stable."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"Scalability is good. I would rate the scalability a nine out of ten."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"The product contains some bugs."
"The support for the solution is not very good, they could improve by being quicker."
"You need to improvise many of the customized rules, which can lead to some errors. BeyondTrust should reduce the error rate."
"We had some issues with the solution and once we contacted support they eventually solved the problem. They could improve their response time."
"The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"It only has limited support for Mac."
"Their technical support could be more responsive and helpful."
"Its feature for establishing workflows needs improvement."
"The product should improve its price."
More BeyondTrust DevOps Secrets Safe Pricing and Cost Advice →
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust DevOps Secrets Safe is ranked 19th in Privileged Access Management (PAM) with 4 reviews while BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 27 reviews. BeyondTrust DevOps Secrets Safe is rated 7.6, while BeyondTrust Endpoint Privilege Management is rated 8.0. The top reviewer of BeyondTrust DevOps Secrets Safe writes "Integrates well between AD and Unix, scalable, and easy to use". On the other hand, the top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". BeyondTrust DevOps Secrets Safe is most compared with HashiCorp Vault, BeyondTrust Password Safe, Delinea Secret Server and Azure Key Vault, whereas BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management. See our BeyondTrust DevOps Secrets Safe vs. BeyondTrust Endpoint Privilege Management report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.