We performed a comparison between BeyondTrust Endpoint Privilege Management and Fortinet FortiAuthenticator based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording."
"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"Reduces major vulnerabilities by removing local administrator privileges."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us."
"The feature I value the most is the one-time passwords because it helps to authenticate users so you know the timing of their usage."
"The ease of use is really nice. Using Authenticator, I've been able to actually work better on my authentication due to the fact that I have a single fabric to authenticate control from my firewall and on my access points. Authentication takes place from this area."
"The logs have great detail that make it easier to evaluate and control the security environment."
"The initial setup is so easy and there is no problem in the implementation."
"I appreciate its ability to provide multi-factor authentication, but it's primarily focused on this function."
"The most valuable features of Fortinet FortiAuthenticator are easy to configure, secure, and the application has good performance."
"The most valuable feature is the flexibility in using the SMS messages."
"The current version is stable...Scalability-wise, it is a fine solution"
"It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then."
"It only has limited support for Mac."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"Its feature for establishing workflows needs improvement."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"Their technical support could be more responsive and helpful."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"I would like to see integration and customization capabilities with the end-user portal to solve authentication issues with diverse implementation scenarios."
"We had issues trying to integrate the keys properly during the initial setup."
"The only way the solution could be improved is if it were cheaper."
"We would like to see Linux-based operating systems be able to integrate with FortiAuthenticator to get two-factor authentication running on them. as well. This is a shortcoming that I have faced a few times already."
"The GUI has some shortcomings and can be made better. The GUI is not great."
"The price of the solution could improve, it is expensive."
"Lacks a simplified two-factor authentication process."
"I would like to see more security features in reference to identity login or identity identification."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Fortinet FortiAuthenticator is ranked 5th in Single Sign-On (SSO) with 50 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Fortinet FortiAuthenticator is rated 8.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Fortinet FortiAuthenticator writes "A reasonably priced solution that can be scaled toward different functionalities and offers flexible SMS messaging". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and WALLIX Bastion, whereas Fortinet FortiAuthenticator is most compared with Cisco ISE (Identity Services Engine), Fortinet FortiToken, Microsoft Entra ID, Fortinet FortiNAC and SailPoint IdentityIQ.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.