Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs CyberArk Endpoint Privilege Manager vs SailPoint Identity Security Cloud comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
6.9
BeyondTrust Endpoint Privilege Management offers ROI through compliance, security, cost savings, and efficient PAM benefits on Microsoft Azure.
Sentiment score
7.1
CyberArk Endpoint Privilege Manager enhances security, reduces risks and costs, saves resources, and protects sensitive information effectively.
Sentiment score
7.6
SailPoint Identity Security Cloud streamlined processes, improved compliance, and reduced costs with automation, yielding ROI in 14-18 months.
Money saving is the main part because every organization tries to reduce their costs.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
I consider CyberArk Endpoint Privilege Manager's return on investment to be good since it effectively accomplishes the goals expected from privilege access management solutions.
 

Customer Service

Sentiment score
7.1
BeyondTrust Endpoint Privilege Management support is positively rated for expertise but could improve response times, especially in Pacific time.
Sentiment score
6.2
CyberArk Endpoint Privilege Manager support is knowledgeable but needs improvements in response times, accessibility, and first-level assistance.
Sentiment score
5.3
SailPoint's customer service is strong and knowledgeable, but some users report delays and language issues in certain regions.
Support is critical, especially when challenges arise related to PAM.
They offer support around the clock, and responses are generally quick.
BeyondTrust support is reliable.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
SailPoint's team consists of specialists who handle tickets without needing to depend on other teams.
Sometimes, the support is slow, and they often suggest resorting to expert services.
Technical support is very good.
 

Scalability Issues

Sentiment score
7.3
BeyondTrust Endpoint Privilege Management scales effectively, supports large networks, and integrates easily, meeting enterprise-level needs efficiently.
Sentiment score
7.7
CyberArk Endpoint Privilege Manager efficiently scales for large deployments, praised for growth-centered architecture despite integration complexities.
Sentiment score
7.2
SailPoint Identity Security Cloud excels in scalability, suitable for large enterprises, but faces challenges with resource allocation and cost.
The initial understanding of the environment is crucial, followed by a simple deployment process.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
The solution scales well as long as we provide the necessary resources.
The solution is scalable and can be upgraded to accommodate increased user counts.
SailPoint is scalable, though challenges exist in terms of workflow and user interface design.
 

Stability Issues

Sentiment score
7.6
BeyondTrust Endpoint Privilege Management is stable and excels in cloud deployments, with minor configuration-related issues noted.
Sentiment score
8.2
CyberArk Endpoint Privilege Manager is stable, with 99.99% uptime, reliable on Windows, needing console improvements and minimal memory.
Sentiment score
7.9
SailPoint Identity Security Cloud is praised for high stability, seamless integration, reliable performance, and minor non-disruptive bugs.
The appliances are stable, and there are no significant issues with backups or recovery.
BeyondTrust Endpoint Privilege Management is very easy to use; if you know the process of cybersecurity, you will not experience downtime.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
IdentityIQ deserves a rating of 12 out of ten for stability.
The version I use now is very stable, especially compared to previous versions like eight point zero and eight point one.
 

Room For Improvement

BeyondTrust Endpoint Privilege Management needs UI enhancement, better OS integration, smoother deployment, improved support, and streamlined policy management.
CyberArk Endpoint Privilege Manager needs improved integration, user interface, and pricing, along with enhanced compatibility and functionality.
SailPoint Identity Security Cloud needs improvements in authentication, integration, customization, user interface, and competitive pricing strategy.
The ability to view recorded live sessions of specific users is a crucial benefit.
There is a need for better MQ integration with DevOps and improvements in architecture.
This product is highly ranked on Gartner, Peers, and other review sites.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
SailPoint lacks some features like privileged account management and access management features found in products like Okta.
I find raising a ticket to be too complex, which could be improved for better user-friendliness.
We have also put our enhancement request, and the SailPoint team has accepted that the feature is not available and plans to include it going forward.
 

Setup Cost

BeyondTrust Endpoint Privilege Management offers complex, competitive pricing with varying licensing models, recommended for negotiation and fixed-price deals.
CyberArk Endpoint Privilege Manager's high pricing is justified by its quality, features, and appeal to large enterprises in finance.
Enterprise users find SailPoint Identity Security Cloud pricing high but justified by its comprehensive features and robust capabilities.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
SailPoint is cheaper than ServiceNow, which is very expensive.
The pricing of SailPoint could be better.
The costs are slightly higher than SailPoint IQ due to included charges for maintenance.
 

Valuable Features

BeyondTrust Endpoint Privilege Management enhances security with granular control, integration, and features like asset discovery and threat detection.
CyberArk Endpoint Privilege Manager enhances security by managing privileges, integrating seamlessly, and preventing ransomware while ensuring regulatory compliance.
SailPoint Identity Security Cloud offers efficient, scalable identity management with AI integration, automation, and user-friendly governance features.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
When any unauthorized user makes an attempt, it notifies the administrators.
For security purposes in BeyondTrust Endpoint Privilege Management, when employees are working in the system, we can make a recording of the video, showing the modifications and configurations they made, allowing us to see everything.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
The automation of provisioning and deprovisioning, managing contractors, temporary users, and the overall automation factor is fantastic.
The solution can be customized to adapt the workflow to our industry, offering considerable flexibility.
From a project management point of view, the tool supports audit success with features to segregate permanent and contractor employees, integrate with HR systems, and indicate other sources for contractors.
 

Mindshare comparison

Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
BeyondTrust Endpoint Privilege Management3.7%
CyberArk Privileged Access Manager16.3%
Delinea Secret Server7.5%
Other72.5%
Privileged Access Management (PAM)
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Endpoint Privilege Manager3.1%
CyberArk Privileged Access Manager16.3%
Delinea Secret Server7.5%
Other73.1%
Privileged Access Management (PAM)
User Provisioning Software Market Share Distribution
ProductMarket Share (%)
SailPoint Identity Security Cloud30.2%
Saviynt14.4%
One Identity Manager10.8%
Other44.599999999999994%
User Provisioning Software
 

Featured Reviews

Md Abdul Hakim - PeerSpot reviewer
Offers solid performance and user adaptability but needs better pricing options and local support
BeyondTrust is a strong, compliance-driven solution with excellent market recognition (Gartner, Peers, etc.), making it appealing for Bangladeshi enterprises. However, some key improvements could accelerate adoption: Areas for Improvement: Pricing & Local Affordability While the product’s capabilities justify its value, cost remains a barrier for many Bangladeshi organizations. Competitive pricing or regional discounts would make it more accessible. Local Support & Partnerships Currently, lack of local partners or trainers creates delays in support, implementation, and pricing negotiations. Establishing a Bangladesh-based support team or authorized resellers would improve responsiveness and trust. Enhanced Onboarding & Training Offering localized training programs (in Bengali/English) and documentation would help IT teams deploy and manage the solution more efficiently. Recommendations for Next Release: Introduce tiered pricing for emerging markets like Bangladesh. Develop a partner network in Bangladesh for faster service and sales. Add simplified dashboards for easier monitoring by non-technical staff. Final Note: BeyondTrust is already a top-tier PAM solution, but addressing these gaps would solidify its leadership in Bangladesh’s growing cybersecurity market.
Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.
Mitch MO - PeerSpot reviewer
Adapts workflows with industry-specific flexibility for big companies
We find flexibility to be one of the most valuable features. The solution can be customized to adapt the workflow to our industry, offering considerable flexibility. Additionally, it is considered a good solution for large companies due to its scalability and ability to cater to the needs of many customers. It has also enhanced security and provided significant flexibility for our specifications module.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
867,341 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Computer Software Company
14%
Manufacturing Company
11%
Government
7%
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
11%
Government
8%
Financial Services Firm
16%
Computer Software Company
13%
Manufacturing Company
9%
Healthcare Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise3
Large Enterprise15
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise9
Large Enterprise18
By reviewers
Company SizeCount
Small Business22
Midsize Enterprise8
Large Enterprise40
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no sh...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
BeyondTrust's pricing is premium but negotiable for Bangladesh. Expect 20-30% extra costs from currency/import factor...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution...
What needs improvement with CyberArk Endpoint Privilege Manager?
While CyberArk Endpoint Privilege Manager is a great tool, I believe the functionality could be wider. If it could wo...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What is your experience regarding pricing and costs for SailPoint IdentityIQ?
The product is expensive. People need to opt for a licensing plan for one year or three years.
What advice do you have for others considering SailPoint IdentityIQ?
You can use SailPoint Atlas to take identity security to the next level. In SailPoint IIQ, writing a custom connector...
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
Viewfinity
IdentityIQ, IdentityNow, Cloud Infrastructure Entitlement Management, Intello
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Information Not Available
Adobe, AXA Technology Services, Cuna Mutual Group, Equifax, ING Direct, Orrstown Bank, Rockwell Automation, SallieMae, Spirit Aerosystems, TEL
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: August 2025.
867,341 professionals have used our research since 2012.