We changed our name from IT Central Station: Here's why

BeyondTrust Endpoint Privilege Management vs Centrify Privileged Access Service comparison

Cancel
You must select at least 2 products to compare!
Featured Review
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management (PAM). Updated: January 2022.
563,780 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It is straightforward. It is a good technology, and it is made to do one single thing.""The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager.""What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy.""Technical support is good.""BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc.""The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."

More BeyondTrust Endpoint Privilege Management Pros →

"This is a cloud-based application, which makes it very easy to deploy."

More Centrify Privileged Access Service Pros →

Cons
"The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does.""What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way.""The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process.""If you don't get the implementation right at the outset, you will struggle with the product.""Their technical support could be more responsive and helpful.""They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment."

More BeyondTrust Endpoint Privilege Management Cons →

"This solution needs better integration with third-party solutions because their ability to support other tools is very weak."

More Centrify Privileged Access Service Cons →

Pricing and Cost Advice
  • "This solution is expensive compared to its competitors."
  • "Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
  • More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →

  • "The price model is based on the number of devices and opposed to the number of users, and it is not very flexible."
  • More Centrify Privileged Access Service Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    563,780 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: 
    It is straightforward. It is a good technology, and it is made to do one single thing.
    Top Answer: 
    Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly… more »
    Top Answer: 
    They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic… more »
    Top Answer: 
    It depends on the weightage of the granular features you are looking for in your PAM solution.  Do you need a PAM solution across your network devices, servers & even endpoints? 
    Ranking
    Views
    7,951
    Comparisons
    5,481
    Reviews
    3
    Average Words per Review
    631
    Rating
    7.7
    Views
    2,220
    Comparisons
    1,654
    Reviews
    1
    Average Words per Review
    466
    Rating
    6.0
    Comparisons
    Also Known As
    BeyondTrust PowerBroker, PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix
    Centrify Zero Trust Privilege Services, Centrify Zero Trust Privilege, Centrify Infrastructure Services, Centrify Server Suite, Centrify Privilege Service
    Learn More
    Overview

    BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.

    Key Solutions Include:

    -ENTERPRISE PASSWORD SECURITY

    Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.

    -ENDPOINT LEAST PRIVILEGE

    Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.

    -SERVER PRIVILEGE MANAGEMENT

    Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.

    -A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS

    Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.

    Learn more at https://www.beyondtrust.com/privilege-management

    Centrify Privilege Service provides all of your IT administration teams with secure, granular access to infrastructure regardless of location, and without the hassles of a VPN.
    Secure browser-based access Authorized IT users launch management sessions for resources directly from the Privilege Service portal. Sessions use SSH and RDP protocols, and are always protected end-to-end.

    Access across organizational boundaries Privilege Service enables you to authenticate your IT users through Active Directory, LDAP Centrify Cloud Directory, or Google G Suite
    Directory. You can use one or any combination of these identity stores to grant granular access to employees, business partners and outside vendors.

    Grant access to specific resources Unlike a VPN, Privilege Service enables you to grant access to
    resources on a on a per-resource basis. This means that you can easily give your internal IT admins access to as much of your infrastructure as necessary, while limiting access by an outsourced
    team to only the servers and network hardware their business role or IT function requires.

    Access from any location Your IT admins can log in and securely access resources from any location that can reach the Privilege Service. For user logins outside the corporate network, you can require Centrify’s built-in multi-factor authentication for security stronger than a user name and password.

    Offer
    Learn more about BeyondTrust Endpoint Privilege Management
    Learn more about Centrify Privileged Access Service
    Sample Customers
    Aera Energy LLC, Care New England, James Madison University
    Boeing, Citi, Credit Suissw, Delta, Duke Energy, FDIC, GE Capital, Harvard University, Johnson & Johnson, Major League Baseball, Michelin, Microsoft
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company27%
    Comms Service Provider19%
    Financial Services Firm7%
    Government5%
    VISITORS READING REVIEWS
    Computer Software Company23%
    Comms Service Provider18%
    Financial Services Firm9%
    Government9%
    Company Size
    REVIEWERS
    Small Business56%
    Midsize Enterprise6%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise31%
    Large Enterprise42%
    No Data Available
    Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management (PAM). Updated: January 2022.
    563,780 professionals have used our research since 2012.

    BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 6 reviews while Centrify Privileged Access Service is ranked 8th in Privileged Access Management (PAM) with 1 review. BeyondTrust Endpoint Privilege Management is rated 8.6, while Centrify Privileged Access Service is rated 6.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "A stable, scalable, and easy-to-deploy solution that can track malicious use or send analytics to a host". On the other hand, the top reviewer of Centrify Privileged Access Service writes "Straightforward to set up and easy to deploy but it needs support for software-defined infrastructure". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Privileged Access Manager, Thycotic Secret Server, CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine) and BeyondTrust Privileged Remote Access, whereas Centrify Privileged Access Service is most compared with CyberArk Privileged Access Manager, Thycotic Secret Server, HashiCorp Vault, CyberArk Enterprise Password Vault and Microsoft Azure Key Vault.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.