Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs CyberArk Endpoint Privilege Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.9
Organizations benefit from BeyondTrust by enhancing security, achieving compliance, reducing costs, and integrating zero-trust for increased ROI.
Sentiment score
7.0
CyberArk Endpoint Privilege Manager boosts security, saves resources, and enhances confidence, offering a perceived positive ROI despite quantification challenges.
Money saving is the main part because every organization tries to reduce their costs.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
I consider CyberArk Endpoint Privilege Manager's return on investment to be good since it effectively accomplishes the goals expected from privilege access management solutions.
 

Customer Service

Sentiment score
7.1
BeyondTrust support is efficient and knowledgeable, yet experiences delay issues, especially in Asia-Pacific, affecting user satisfaction.
Sentiment score
6.6
CyberArk Endpoint Privilege Manager support is generally rated high, with quick resolutions but concerns about response times and accessibility.
Support is critical, especially when challenges arise related to PAM.
They offer support around the clock, and responses are generally quick.
BeyondTrust support is reliable.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
 

Scalability Issues

Sentiment score
7.5
BeyondTrust Endpoint Privilege Management offers seamless scalability and reliability for organizations of any size, ensuring efficient user asset management.
Sentiment score
7.7
CyberArk Endpoint Privilege Manager efficiently scales for varied environments, supporting small to large enterprises with a distributed cloud-based architecture.
The initial understanding of the environment is crucial, followed by a simple deployment process.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
 

Stability Issues

Sentiment score
7.6
Users commend BeyondTrust for stability and reliability, despite initial setup challenges and minor UI and integration issues.
Sentiment score
8.2
CyberArk Endpoint Privilege Manager is stable and reliable, maintaining 99.99% uptime with rare issues and smooth offline adaptation.
The appliances are stable, and there are no significant issues with backups or recovery.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
 

Room For Improvement

BeyondTrust Endpoint Privilege Management requires enhancements in security, integration, support, deployment, error management, pricing, and responsive customer service.
CyberArk Endpoint Privilege Manager requires improvements in UI, integration, performance, support, threat detection, customization, pricing flexibility, and automation.
The ability to view recorded live sessions of specific users is a crucial benefit.
There is a need for better MQ integration with DevOps and improvements in architecture.
This product is highly ranked on Gartner, Peers, and other review sites.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
 

Setup Cost

BeyondTrust Endpoint Privilege Management is seen as expensive due to licensing complexities and additional costs, especially for Mac clients.
CyberArk Endpoint Privilege Manager is costly but considered reasonable for its features, with significant discounts for large enterprises.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
 

Valuable Features

BeyondTrust enhances security with privilege management, integration, session recording, and is valued for ease of use and scalability.
CyberArk Endpoint Privilege Manager enhances security by managing privileges, reducing admin needs, and improving operational efficiency and data protection.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
When any unauthorized user makes an attempt, it notifies the administrators.
Administrators need a tool that provides visibility and clarity about endpoint management within the organization.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Ranking in Privileged Access Management (PAM)
8th
Ranking in Anti-Malware Tools
14th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
31
Ranking in other categories
No ranking in other categories
CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
4th
Ranking in Anti-Malware Tools
5th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Application Control (5th), Ransomware Protection (6th)
 

Mindshare comparison

As of June 2025, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Endpoint Privilege Management is 3.8%, down from 5.2% compared to the previous year. The mindshare of CyberArk Endpoint Privilege Manager is 3.4%, down from 3.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Md Abdul Hakim - PeerSpot reviewer
Offers solid performance and user adaptability but needs better pricing options and local support
BeyondTrust is a strong, compliance-driven solution with excellent market recognition (Gartner, Peers, etc.), making it appealing for Bangladeshi enterprises. However, some key improvements could accelerate adoption: Areas for Improvement: Pricing & Local Affordability While the product’s capabilities justify its value, cost remains a barrier for many Bangladeshi organizations. Competitive pricing or regional discounts would make it more accessible. Local Support & Partnerships Currently, lack of local partners or trainers creates delays in support, implementation, and pricing negotiations. Establishing a Bangladesh-based support team or authorized resellers would improve responsiveness and trust. Enhanced Onboarding & Training Offering localized training programs (in Bengali/English) and documentation would help IT teams deploy and manage the solution more efficiently. Recommendations for Next Release: Introduce tiered pricing for emerging markets like Bangladesh. Develop a partner network in Bangladesh for faster service and sales. Add simplified dashboards for easier monitoring by non-technical staff. Final Note: BeyondTrust is already a top-tier PAM solution, but addressing these gaps would solidify its leadership in Bangladesh’s growing cybersecurity market.
Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
856,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Computer Software Company
14%
Manufacturing Company
10%
Government
7%
Financial Services Firm
15%
Computer Software Company
15%
Manufacturing Company
11%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
Setup costs vary depending on the scenario. Sometimes we win orders, and other times we lose due to partner preferences or deal scenarios. Customers may negotiate on price, understanding that quali...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost. It's really one of the best solutions.
What needs improvement with CyberArk Endpoint Privilege Manager?
The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM. These tools need to be defined and synced with the client or agent and master, ...
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
Viewfinity
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Information Not Available
Find out what your peers are saying about BeyondTrust Endpoint Privilege Management vs. CyberArk Endpoint Privilege Manager and other solutions. Updated: June 2025.
856,873 professionals have used our research since 2012.