Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs CyberArk Privileged Access Manager vs Varonis Platform comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
BeyondTrust Endpoint Privilege Management3.8%
CyberArk Privileged Access Manager15.8%
WALLIX Bastion7.2%
Other73.2%
Privileged Access Management (PAM)
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager15.8%
WALLIX Bastion7.2%
Delinea Secret Server7.1%
Other69.9%
Privileged Access Management (PAM)
Data Loss Prevention (DLP) Market Share Distribution
ProductMarket Share (%)
Varonis Platform5.9%
Microsoft Purview Data Loss Prevention12.6%
Forcepoint Data Loss Prevention8.5%
Other73.0%
Data Loss Prevention (DLP)
 

Featured Reviews

Md Abdul Hakim - PeerSpot reviewer
Offers solid performance and user adaptability but needs better pricing options and local support
BeyondTrust is a strong, compliance-driven solution with excellent market recognition (Gartner, Peers, etc.), making it appealing for Bangladeshi enterprises. However, some key improvements could accelerate adoption: Areas for Improvement: Pricing & Local Affordability While the product’s capabilities justify its value, cost remains a barrier for many Bangladeshi organizations. Competitive pricing or regional discounts would make it more accessible. Local Support & Partnerships Currently, lack of local partners or trainers creates delays in support, implementation, and pricing negotiations. Establishing a Bangladesh-based support team or authorized resellers would improve responsiveness and trust. Enhanced Onboarding & Training Offering localized training programs (in Bengali/English) and documentation would help IT teams deploy and manage the solution more efficiently. Recommendations for Next Release: Introduce tiered pricing for emerging markets like Bangladesh. Develop a partner network in Bangladesh for faster service and sales. Add simplified dashboards for easier monitoring by non-technical staff. Final Note: BeyondTrust is already a top-tier PAM solution, but addressing these gaps would solidify its leadership in Bangladesh’s growing cybersecurity market.
Atul-Gujar - PeerSpot reviewer
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Frederic  Delos - PeerSpot reviewer
Offers the ability to identify sensitive areas, allowing you to drill down into the sensitive data
The most effective feature for me is its ability to identify sensitive areas, allowing you to drill down into the sensitive data, provided you have access, to determine whether it's a false positive or a true positive. That's the best thing for me, out of all of it. It's got everything, like other ones, but I like to be able to look at something if I'm doing forensics on the alert and say, "Okay, do I really need to do something with this?" For example, we don't want sensitive data in our OneDrive. So it identifies the sensitive data that's possibly in the OneDrive. And what I can do is look at it and identify whether it's actually sensitive data in Datalert or whether it looks like sensitive data, but I know it's a false positive. If it is a false positive, I can basically say ignore this pattern based on X, Y, and Z, you know, whether it's Redjax or keyword proximity. So I like that. With other tools, I gotta go through a whole process because it's a little bit more complex. Here, I can tag it and bag it in one shot. And the next good time I scan, it slips over it. So it helps in that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"The product is secure."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"BeyondTrust Endpoint Privilege Management positively impacts the organization by providing more security and benefits, such as ensuring that if modifications are made, we can see where mistakes occurred in the recording video."
"The solution's technical support is good."
"Administrators need a tool that provides visibility and clarity about endpoint management within the organization. This addresses the issue of managing privileged users, which is crucial for any administrator or higher management team to control."
"Technical support is good."
"The most valuable feature of CyberArk Privileged Access Manager is the vault. I am satisfied with the interface and the documentation."
"There are no issues with scalability. Our clients are very happy to use the product."
"The password vault and session monitoring are useful."
"It allows users to self-provision access to the accounts that they need."
"For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks."
"I would rate this solution a nine out of ten."
"With PAM in place, we've experienced a significant reduction in potential security breaches."
"CyberArk has the ability to change the credentials on every platform."
"The most important feature is remediation. In remediation support, there is no group permission. We'll go ahead and remediate the access from the Dell folder to the parent folder."
"The telemetry to capture everything and the reports are very easy to configure without having a developer degree."
"The analytics would have to be our most valuable feature."
"Technical support from Varonis is rated as nine out of ten."
"Varonis Platform is transparent and captures everything in the environment without impacting the performance. The tool helps us unify data feeds into a single reporting system."
"The solution ensures that users have not accidentally shared sensitive information with the wrong people or too many people."
"I also appreciate the reporting feature, which allows for the extraction of various reports based on specific needs. These reports can be used for audit purposes, such as tracking changes in file locations or deletions."
"On the Varonis side, technical support is phenomenal. Their ability to explain is very good, and they seem to be very knowledgeable. When I get an alert that doesn't quite make sense, they dive in there and kind of take me through it. That's very useful and very good. There are some false alerts, but it is better to have a false alert than no alert at all."
 

Cons

"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"Its feature for establishing workflows needs improvement."
"If they improve their price in Bangladesh, since they do not have local partners or local trainers, clients or integrators find it difficult to reach BeyondTrust for support, service, and price quotation."
"Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful."
"How the accounts are presented in the solution's UI can be improved."
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"Improvements could focus on adding more AI features to automate processes that are currently manual or challenging for end users."
"The tool's UI has bugs and lags. It needs to be improved. The deployment process can be complex due to multiple components for various functionalities, each requiring separate infrastructure management. To simplify this process, consolidating all these components into a single platform could be beneficial. The product's pricing could be cheaper."
"Enhanced PSM support for Java based applications."
"​It's hard to find competent resellers/support."
"Initially, there was a lot of hiccups, because there were a lot of transitions due to manual installations."
"The solution needs better features for end users to manage their own whitelisting for API retrieval."
"Performance of PIM could be better and intended for usability as well as security."
"The initial setup could be simpler but it may not be as effective."
"The continuous scanning of the assets is limited to Windows and Unix. We like to have the solution scan any databases, network devices, and security devices for privileged accounts. That would be very helpful."
"The solution's interface is a little complicated with regard to setting up filters and reports."
"The GUI should be more functional. There should be a process for connecting through Chrome, Internet Explorer, etc."
"Varonis requires more access permissions for its core functions compared to competitors, which can be a concern for companies about data safety."
"The product is very complicated."
"We have Microsoft Office 365. I just saw an article today which says that they're actually getting integrated with Microsoft Office 365, which would be a useful feature. For user-based reports, log on activity, and stuff like that, it doesn't seem to really be present like Log360. That could just be my inexperience with it. I've been dealing with it for only about two and a half months."
"There is one thing that if I add something manually, I get so many alerts. That's the biggest bad thing."
"The remediation process can be improved. There will be no existing permission group for the McAfee channel domains. We can create a new permissions group for the required folder."
"I'd like to see automatic updates for this solution. Currently, it's a manual process to update all the keywords"
 

Pricing and Cost Advice

"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten."
"The product’s licensing is different for Windows, Linux, and Mac. The tool’s licensing is yearly."
"This solution is expensive compared to its competitors."
"The solution's pricing is high."
"It was very expensive."
"Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
"PowerBroker for a Mac client is three times the price of the Windows version."
"Its pricing and licensing are okay. We were in the perpetual model when it was on-prem, and now, with the SaaS service, we have a subscription model. As a customer, I would always like to see a lower price, but it seems to be priced at the right model currently, and we are trying to get the maximum benefits out of it."
"CyberArk is good at what they do, and the price reflects that. You have to pay the price for the same."
"CyberArk Privileged Access Manager is perceived to be somewhat overpriced compared to similar market products. It is a little bit overvalued. It could come down a little bit for my liking. However, the industry-leading reputation and the quality of service justify the high price point to some extent."
"Before we bought it, they were licensing each function individually, which got complicated and very expensive. When we decided to buy it, it was much more straightforward and still quite expensive, but it brings a lot of value and risk reduction to the organization."
"The product's licensing is yearly. I would rate the solution's pricing a six out of ten."
"I'm a technician so I don't handle the licensing for CyberArk Privileged Access Manager, but I know that the price for the core license is about â‚Ĵ140 per year. There's another type of license, the external vendor license, and that's about â‚Ĵ600 and you can manage twenty devices. From what I know, the price for one device in a subscription is about â‚Ĵ65 per year. You can buy the CyberArk Endpoint Privilege Manager too, or you can buy some other application or application license with CyberArk Privileged Access Manager, but all other features, such as the Analytics Server is included in the basic CyberArk license. With WALLIX, you need to buy separate licenses for the features."
"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"There are additional features added to our CyberArk Privileged Access Manager license. For example, features that allow us to integrate into various kinds of platforms."
"I do not have any opinions to add about the pricing of the product."
"Varonis Platform wasn't certainly the cheapest solution."
"The pricing is good. It neither expensive nor cheap. It is average."
"It's expensive, kind of, really expensive."
"The platform is expensive. I rate the pricing a nine out of ten."
"I would rate the pricing an eight out of ten, with ten being the most expensive."
"Licensing is on an annual basis. Maintenance and renewal fees are separate. Varonis Datalert is quite expensive."
"You could do a subscription, where you pay yearly, or you could purchase it outright. The licensing cost is based on the number of users on the system that you are monitoring."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
868,654 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Computer Software Company
15%
Manufacturing Company
10%
Government
7%
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
9%
Government
6%
Financial Services Firm
15%
Manufacturing Company
9%
Computer Software Company
9%
Insurance Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise3
Large Enterprise15
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise41
Large Enterprise171
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise1
Large Enterprise11
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no sh...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
BeyondTrust's pricing is premium but negotiable for Bangladesh. Expect 20-30% extra costs from currency/import factor...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
Regarding costs, CyberArk Privileged Access Manager is not a cheap product; hence, many companies struggle with its h...
What do you like most about Varonis Platform?
The solution has significantly improved data security and compliance posture by allowing us to track and monitor acti...
What needs improvement with Varonis Platform?
Varonis started as an on-premises solution and is transitioning to cloud. It hasn't fully moved yet, which is an area...
What is your primary use case for Varonis Platform?
The primary use case for Varonis Platform is data discovery, specifically for discovering sensitive data in our organ...
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
SlashNext Complete
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Rockwell Automation
Nottingham Building Society
Find out what your peers are saying about CyberArk, Delinea, WALLIX and others in Privileged Access Management (PAM). Updated: September 2025.
868,654 professionals have used our research since 2012.