Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM).
Money saving is the main part because every organization tries to reduce their costs.
Support is critical, especially when challenges arise related to PAM.
They offer support around the clock, and responses are generally quick.
BeyondTrust support is reliable.
Support now requires opening a ServiceNow ticket, which can be time-consuming.
When I faced issues integrating custom applications with Delinea Secret Server, the support from their deployment partner was inadequate.
Technical support from Delinea is good.
The initial understanding of the environment is crucial, followed by a simple deployment process.
I would give it an eight or nine out of ten for scalability, possibly even a ten, as I do not see a limitation in scaling.
BeyondTrust Privileged Remote Access is a scalable solution based on user requirements.
The appliances are stable, and there are no significant issues with backups or recovery.
BeyondTrust Endpoint Privilege Management is very easy to use; if you know the process of cybersecurity, you will not experience downtime.
Updates sometimes introduce bugs or issues, especially with non-English versions.
Delinea Secret Server can be considered as a stable and reliable for most enterprise use cases, especially in vaulting and privileged access management.
The stability is less than ideal since it updates to our console can take around six to ten hours.
The ability to view recorded live sessions of specific users is a crucial benefit.
There is a need for better MQ integration with DevOps and improvements in architecture.
This product is highly ranked on Gartner, Peers, and other review sites.
BeyondTrust should focus on automating the update process to reduce unnecessary ticket creation.
We are looking for a feature where if someone is doing something risky during their session, it should alert and possibly disable their credentials.
Most of the time, the solution tends to fail, necessitating the need to pull data from backup servers.
Certain features like the Remote Access Service (RAS) Engine and syncing with directory services may still have bugs or limitations.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
My experience with pricing, setup cost, and licensing is that it is expensive, yet not the most expensive in the market, so the price can be considered justifiable.
The price of Delinea Secret Server is okay, however, the solution is considered expensive when compared to others.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
When any unauthorized user makes an attempt, it notifies the administrators.
For security purposes in BeyondTrust Endpoint Privilege Management, when employees are working in the system, we can make a recording of the video, showing the modifications and configurations they made, allowing us to see everything.
The secure access must be audited live, ensuring patient data protection.
The session monitoring and recording feature definitely helps security and audit with BeyondTrust Privileged Remote Access.
Delinea Secret Server doesn't offer any exceptional features; most solutions have similar capabilities such as automatic password rotation, activity log monitoring, and activity log auditing.
Product | Market Share (%) |
---|---|
Delinea Secret Server | 7.5% |
BeyondTrust Endpoint Privilege Management | 3.7% |
BeyondTrust Privileged Remote Access | 4.4% |
Other | 84.4% |
Company Size | Count |
---|---|
Small Business | 15 |
Midsize Enterprise | 3 |
Large Enterprise | 15 |
Company Size | Count |
---|---|
Small Business | 12 |
Midsize Enterprise | 4 |
Large Enterprise | 7 |
Company Size | Count |
---|---|
Small Business | 20 |
Midsize Enterprise | 10 |
Large Enterprise | 24 |
BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.
Key Solutions Include:
-ENTERPRISE PASSWORD SECURITY
Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.
-ENDPOINT LEAST PRIVILEGE
Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.
-SERVER PRIVILEGE MANAGEMENT
Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.
-A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS
Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.
Learn more at https://www.beyondtrust.com/privilege-management
BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.
Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security.
Features include:
- Privileged Access Control: Enforce least privilege by giving users the right level of access.
- Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections.
- Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway.
- Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials.
- Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere.
- Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.
Secret Server is a fully-featured Privileged Access Management (PAM) solution available both on premise and in the cloud. It empowers security and IT ops teams to secure and manage all types of privileged accounts and offers the fastest time to value of any PAM solution.