We performed a comparison between BeyondTrust Endpoint Privilege Management and Keeper based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The implementation is quite easy because the documents are always online."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"Technical support is good."
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"Reduces major vulnerabilities by removing local administrator privileges."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"Enables IT department to force very complex passwords for certain users."
"It saves us from duplicating passwords for different accounts."
"The chat support is quick. I have never encountered any problems. On the contrary, they have been very helpful and kind."
"Possibility to login using the fingerprint sensor on Android/iPhone."
"It keeps my passwords organized and safe."
"The ability to autofill the login credentials has saved me a lot of time in my day to day computing."
"Keeper has strong security features."
"Keeper Bridge."
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"Its feature for establishing workflows needs improvement."
"It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then."
"How the accounts are presented in the solution's UI can be improved."
"Reports to the end user."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"Needs to provide an API to be integrated with the information systems and offer secure file hosting service with sharing and editing capabilities."
"Room for improvement in my eyes would be being able to share my credit cards and other types of information. The only thing they really share is passwords, and you can only do it with one password at a time. When you're trying to share it out or trying to remove it from being shared, you can't do multiple selections."
"The user experience and the mobile app could be improved."
"If you purchase the premium, then after the subscription expires, you cannot edit your passwords any longer, even if you could before you purchased the paid subscription."
"I would love it if you didn't have to re-authenticate when you start up a new browser."
"Search functions are sometimes weird."
"I would add a category for personal documents or photos of ID cards."
"Its aesthetic needs improvement."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Keeper is ranked 10th in Enterprise Password Managers with 32 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Keeper is rated 9.2. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Keeper writes "It's an inexpensive, scalable solution that has improved our security". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Keeper is most compared with HashiCorp Vault, CyberArk Privileged Access Manager, Azure Key Vault, LastPass and Delinea Secret Server.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.