We performed a comparison between BeyondTrust Endpoint Privilege Management and Fortra's Powertech Identity & Access Manager based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The tool is easy to use and deploy. It has PAM capabilities like privilege access. The solution helps with the management of third parties and vendors. It is an effective solution compared to other alternatives."
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"The implementation is quite easy because the documents are always online."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"HelpSystems Powertech's feature that I have found most valuable is its flexibility. It is able to be extended. A lot of the products these days, especially the ones on the cloud, are limited and can't handle all the use cases. Often there is not even a way to customize the application to meet uncommon use cases and HelpSystems provides an infrastructure that lends itself to the ability to be customized."
"They need to come up with better integrative options which should be customer-centric."
"Their technical support could be more responsive and helpful."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"If you don't get the implementation right at the outset, you will struggle with the product."
"Reports to the end user."
"The product should improve its price."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"In terms of what could be improved, I would say the support of the product. It's hard to get support for it. I think this is emblematic of the fact that they don't have a lot of employees who have long-term experience with it."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
Earn 20 points
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Fortra's Powertech Identity & Access Manager is ranked 39th in Privileged Access Management (PAM). BeyondTrust Endpoint Privilege Management is rated 8.0, while Fortra's Powertech Identity & Access Manager is rated 5.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Fortra's Powertech Identity & Access Manager writes "Inexperienced support for old product, but good flexibility for use case customization". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Fortra's Powertech Identity & Access Manager is most compared with .
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.