BeyondTrust Endpoint Privilege Management vs SailPoint Identity Security Cloud comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Average Rating
8.0
Number of Reviews
28
Ranking in other categories
Privileged Access Management (PAM) (5th), Anti-Malware Tools (12th)
SailPoint Identity Security...
Average Rating
8.2
Number of Reviews
62
Ranking in other categories
User Provisioning Software (1st), Identity Management (IM) (2nd), Identity and Access Management as a Service (IDaaS) (IAMaaS) (3rd), Cloud Infrastructure Entitlement Management (CIEM) (1st)
 

Mindshare comparison

As of June 2024, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Endpoint Privilege Management is 5.0%, down from 6.5% compared to the previous year. The mindshare of SailPoint Identity Security Cloud is 3.1%, up from 2.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
Unique Categories:
Anti-Malware Tools
2.2%
User Provisioning Software
33.5%
Identity Management (IM)
22.3%
 

Featured Reviews

Marlin B Pohlman - PeerSpot reviewer
Oct 24, 2022
Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us
The most important factor is the ability to invoke least privilege, which is required under 27701 and GDPR. We have used the solution to remove users' administrative rights and instead provide on-demand, token-based administrative rights. The latter is an option for a single, temporary increase in privileges for a trusted user for a specific time. We use it in a medical environment for HIPAA compliance or medical compliance in a GDPR case. For example, if you have a clinician who needs access to a specific piece of medical information, or if there is an administrator who needs to have administrator rights to a particular database for a limited period of time, we can give it and then revoke it. That's another reason the tool is useful. Also, the fact that we are able to add events straight from event logs and/or the database is important for crisis management and rapid reaction. This ability helps us meet our SLA requirements. In addition, we can elevate approved applications and actions without broad administrative rights. We can temporarily increase privilege based on tasks. If someone puts in a ticket, we increase their privilege for that ticket. We then watch to see if that ticket has been resolved and then we decrease it. Another feature of the platform is instant risk reduction solutions. We can do a risk metric with it, and we do that as part of our risk evaluation. We can increase and decrease privilege and we can actually show that in the ISO 13485 risk metric. And it provides a single solution for managing endpoint security preferences. It does a good job of that.
RF
Jan 23, 2024
Comprehensive identity governance and compliance solution offering robust integration capabilities, extensive reporting features and a user-friendly interface
It effectively streamlined our user access management processes, serving as a central hub within our enterprise ecosystem. With various credentialing IdentityIQ access management solutions in place across the organization, SailPoint integrated seamlessly with these systems. It ingested events from these sources, generated reports, and initiated outgoing events and triggers to facilitate appropriate actions based on user and supervisor actions. The policy management and risk-scoring capabilities of SailPoint IdentityIQ greatly benefited our organization. While we primarily focused on policy enforcement based on written guidelines for identity lifecycle management, we didn't extensively utilize a risk-based approach, as that fell under a separate area of resource management. However, within the policy feature set, SailPoint provided robust options. We were able to categorize users into different groups, such as office users, retail channel users, and backend users. Additionally, we could apply role-based access controls and differentiate between temporary and permanent employees, full-time and part-time staff, and those with specific time-based access requirements or temporary assignments within the organization. The implementation of IdentityIQ significantly impacted our IT audit and compliance activities. SailPoint was introduced in response to an audit observation, as no prior system was in place and everything relied on manual processes. This lack of automation resulted in gaps and oversights. Implementing SailPoint IdentityIQ for attestation and governance effectively addressed this audit observation and closed the compliance gap. It played a crucial role in addressing a complex identity management challenge within our company, particularly in the area of credential cleanup. Given the large user population, a dedicated team within the IAM pillar focused on this task. Before SailPoint, it was common to encounter instances where user identities remained active even after individuals had moved roles or left the company. For example, credentials associated with finance or treasury functions would still be accessible, even if the user had transitioned to a different department. Similarly, sensitive data access, such as payroll and HR systems, posed risks if not appropriately managed post-employee departure. SailPoint streamlined the process of managing these identities, effectively identifying and addressing instances where inactive accounts lingered, sometimes for extended periods, thus enhancing overall security and compliance efforts.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us."
"Technical support is good."
"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"The solution's technical support is good."
"What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
"Reduces major vulnerabilities by removing local administrator privileges."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"The big one now is that they're adding AI and machine learning to figure out automated approvals and make recommendations to their reviewers. So, if I bring up Doug McPherson and it says he has access to this application, the system will make a review based on peer group analysis. That's one of the biggest new things. The problem used to be that people would get everything loaded on, and they created too much work for themselves. Now, they can use these policies and start to let the machine pick the less risky things."
"Has a great certification module with intuitive options."
"Good life cycle management, segregation of duties, and analytics features."
"The solution’s stability and performance are good."
"I like IdentityIQ's granular attachment management and certification customization features."
"I find the built-in connectors, lifecycle management, certification, and recertification features to be the most valuable."
"It is simple and easy to implement."
"Access certification and provisioning are two of the solutions most valuable features."
 

Cons

"Reports to the end user."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful."
"Their technical support could be more responsive and helpful."
"We faced some challenges with remote desktop sessions."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"The product has poor reporting and analytic capabilities. Reports are not easy to use and its analytic capabilities are limited."
"The product must improve its support."
"There are various functions that don't work in IdentityIQ, including the access request reminder, which doesn't go to the approvals in the proper format, so it's hard for users to read."
"The report functionality and dashboard of the access manager could be improved."
"The cost of this solution is high. The technical assistance center could be improved. They're very good, but considering the intricacies of the solution, they can further improve."
"They should lower the price and technical support should be better."
"It is too technical. You need really good technical skills in Java and other technologies, which are hard to find. If they can make it easier so that things can be done with a few clicks, it will be great."
"The product’s cloud offering could be flexible."
 

Pricing and Cost Advice

"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten."
"It is relatively more cost-effective compared to the competing product."
"This solution is expensive compared to its competitors."
"PowerBroker for a Mac client is three times the price of the Windows version."
"The solution's pricing is high."
"The product’s licensing is different for Windows, Linux, and Mac. The tool’s licensing is yearly."
"Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
"What BeyondTrust was providing was user-based licensing which was a great benefit from the client point of view. Recently, I don't know why, the licensing model has been changed, and that is the reason that they have lost a bit of their edge when it comes to the PAM, against our competition. The asset-based licensing, from the user's point of view, is not beneficial. The licensing should be based on the users. The greater the number of users, the greater will be the load and the greater the scalability problems. I presume that is why the licensing model has changed."
"We pay an annual licensing cost for SailPoint IdentityIQ."
"The solution is not cheap."
"SailPoint is expensive compared to its competitors. It's one of the most expensive products, so I'd rate it as one out of five, cost-wise."
"I found the pricing to be relatively high."
"SailPoint IdentityIQ is too expensive for small and medium companies. It is an expensive product."
"I rate the solution a seven on a scale where one is cheap and ten is too expensive. In short, the solution falls under the higher side of pricing."
"The product is expensive. People need to opt for a licensing plan for one year or three years."
"They are expensive."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
787,817 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
12%
Manufacturing Company
10%
Government
8%
Financial Services Firm
17%
Computer Software Company
14%
Manufacturing Company
9%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about SailPoint IdentityIQ?
The first valuable feature of the solution is its interface. The second feature of the solution is the level of flexibility it provides.
What is your experience regarding pricing and costs for SailPoint IdentityIQ?
The product is expensive. People need to opt for a licensing plan for one year or three years.
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
IdentityIQ, IdentityNow, Cloud Infrastructure Entitlement Management
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Adobe, AXA Technology Services, Cuna Mutual Group, Equifax, ING Direct, Orrstown Bank, Rockwell Automation, SallieMae, Spirit Aerosystems, TEL
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: June 2024.
787,817 professionals have used our research since 2012.