

Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM).
Money saving is the main part because every organization tries to reduce their costs.
It has also decreased our time to detection and response by about 15 to 20 percent.
Overall, cost of owning and operating our system goes down.
It's hard to quantify the return on investment we've seen from Microsoft Defender for Office 365.
Support is critical, especially when challenges arise related to PAM.
They offer support around the clock, and responses are generally quick.
BeyondTrust support is reliable.
Over the past two years, there have been no critical problems.
we opened tickets, and they typically resolve them quickly.
With a subscription for Microsoft Defender for Office 365, it is an eight. Without it, it is a six.
The initial understanding of the environment is crucial, followed by a simple deployment process.
We have never faced scalability problems, and Microsoft manages it effectively.
Microsoft Defender for Office 365 scales transparently for us, as we grew from 1,000 users to 3,000 users, and we didn't notice much difference.
Microsoft Defender for Office 365 scales with the growing needs of my company well.
The appliances are stable, and there are no significant issues with backups or recovery.
BeyondTrust Endpoint Privilege Management is very easy to use; if you know the process of cybersecurity, you will not experience downtime.
I would rate the stability of Microsoft Defender for Office 365 as 10 over 10 because it's highly available, it works, and it does the job it is meant to do.
I have not experienced any downtime, crashes, or performance issues because of Defender.
The solution is stable, as we have been using it for the past two years.
The ability to view recorded live sessions of specific users is a crucial benefit.
There is a need for better MQ integration with DevOps and improvements in architecture.
This product is highly ranked on Gartner, Peers, and other review sites.
The main area for improvement is simplifying the implementation and rollout process.
Microsoft could improve by offering recommendations for domain spoofing attacks, especially scenarios where DNS records like SPF, DKIM, and DMARC are not properly published.
There is a different console for different things; I just want one consolidated console.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
We've likely saved 30% of costs.
Money-wise, it is a part of the Office 365 suite, making it slightly more expensive compared to Trend Micro.
Microsoft is quite affordable with a lot of features available for any size organization.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
When any unauthorized user makes an attempt, it notifies the administrators.
For security purposes in BeyondTrust Endpoint Privilege Management, when employees are working in the system, we can make a recording of the video, showing the modifications and configurations they made, allowing us to see everything.
It ranks the threats and allows us to prioritize those hitting us the hardest, such as email threats.
It provides end-to-end visibility on email threats such as phishing, extending beyond Exchange Online Protection.
The value of the DLP feature is significant to us because we have internal data, sometimes sensitive, and the users may not always be aware of security and privacy, which might lead them to send out information mistakenly to external parties.
| Product | Mindshare (%) |
|---|---|
| BeyondTrust Endpoint Privilege Management | 3.1% |
| CyberArk Privileged Access Manager | 10.4% |
| Delinea Secret Server | 4.5% |
| Other | 82.0% |
| Product | Mindshare (%) |
|---|---|
| Microsoft Defender for Office 365 | 6.9% |
| Proofpoint Email Protection | 7.2% |
| Cisco Secure Email | 4.7% |
| Other | 81.2% |


| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 3 |
| Large Enterprise | 15 |
| Company Size | Count |
|---|---|
| Small Business | 24 |
| Midsize Enterprise | 12 |
| Large Enterprise | 32 |
BeyondTrust Endpoint Privilege Management offers enhanced security through asset discovery and privilege elevation without administrative rights, supporting seamless operations in complex environments.
BeyondTrust Endpoint Privilege Management combines advanced threat detection with powerful tools like application control and session management. It is designed to secure IT infrastructures by removing local admin privileges and facilitating remote application publishing. With integration capabilities and robust compliance support, it is suitable for sectors needing stringent security measures. However, improvements in update frequency, Mac integration, and pricing, along with enhanced reporting and console access, are needed to broaden market reach. Organizations value its scalability and flexibility, despite needing better support and development maturity.
What Features Define BeyondTrust Endpoint Privilege Management?BeyondTrust Endpoint Privilege Management is widely adopted in the finance and healthcare industries for privileged access management and compliance. It is instrumental in secure server access and remote management, aligning with zero-trust approaches and integrating smoothly with enterprise platforms.
Microsoft Defender for Office 365 offers real-time email security, enhancing threat detection through integration within the Microsoft ecosystem. Its user-friendly interface and central management streamline operations, providing robust protection against phishing, ransomware, and malware.
Defender for Office 365 is focused on efficiently securing email communication by safeguarding against phishing, malware, and spam threats. With its strong integration with other Microsoft services, it is tailored to improve endpoint security and identity protection. Its centralized management tools simplify threat prioritization, while the automated threat response capabilities ensure swift actions against potential risks. Organizations leverage its capabilities to efficiently manage their cybersecurity efforts, particularly in remote work environments, while maintaining a secure system across Office 365 applications and Azure-hosted services.
What are the key features?Implementations of Defender for Office 365 vary across industries, optimizing email security for sectors such as finance, healthcare, and education. In finance, it aids in protecting sensitive financial data from phishing and fraud. Healthcare benefits from secure communications, ensuring patient data privacy. Educational institutions use it to maintain secure virtual learning environments against cyber threats.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.