We performed a comparison between BeyondTrust Endpoint Privilege Management and Malwarebytes based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"I find the solution’s features like section management, password management, and analytics valuable."
"The implementation is quite easy because the documents are always online."
"What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
"I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording."
"I was very satisfied with Malwarebytes in terms of its antivirus abilities."
"It gets the job done, and they are consistently updating it monthly."
"The dashboard actually is good and it is simple."
"The platform is straightforward to install."
"The endpoint protection and response that allows us to restore a machine back to a pre-infected state are the most valuable features."
"The solution is very good at scanning."
"The most valuable features of Malwarebytes are the agents, user experience, efficiency of the findings, and MDR features."
"Malwarebytes is a comprehensive solution for keeping endpoints safe and secure from intruders, viruses, malware and so on."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"They need to come up with better integrative options which should be customer-centric."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"The product should improve its price."
"If you don't get the implementation right at the outset, you will struggle with the product."
"It would be better if updates could be downloaded, and deployed, on-premises to avoid low bandwidth causing issues."
"Malwarebytes is too simplistic. From a SOC IR perspective, it doesn't give you very much data around it. It doesn't tie things or provide SHA-1 and SHA-256 detection information, which makes it hard to do an additional investigation."
"I would like to see integration with other vendors going forward."
"Overall, I haven't found any ways the solution lacks in features or usability."
"Malwarebytes should improve its mobile compatibility."
"The interface could be improved. Currently, you need to really dig around to find the elements you need."
"There is room for improvement in the way it is deployed, in terms of being able to distribute it. Right now we have to get our hands on a machine to deploy it. It would be nice if there was an easier system."
"The product update capability needs to be improved."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 27 reviews while Malwarebytes is ranked 18th in Endpoint Protection Platform (EPP) with 33 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Malwarebytes is rated 8.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Malwarebytes writes "Intuitive, easy to use, and does a good job of catching and stopping things for the most part and has a unique rollback feature". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas Malwarebytes is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, HP Wolf Security, SentinelOne Singularity Complete and ESET Endpoint Protection Platform.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.