We performed a comparison between BeyondTrust Endpoint Privilege Management and SAP Identity Management based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."It scales easily and the product is stable."
"I find the solution’s features like section management, password management, and analytics valuable."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"Technical support is good."
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"The setup process is straightforward."
"It provides basic automatic user administration and role provisioning to save time."
"The most valuable feature is the user experience for managing information."
"Rather than implement a basic SSO, this solution assisted us with setting up two-factor authentication."
"The most valuable features of SAP Identity Management are business roles and automated user provisioning."
"What I like about SAP Identity Management is that it's stable for experienced users and suitable for access management, not just for SAP accounts, but for Active Directory, including file sharing and process sharing."
"What I found most valuable in SAP Identity Management is process automation. The solution also gives transparency about what is happening and why which I find beneficial. Another feature I found valuable in SAP Identity Management is integration. It has very good integration."
"The tool's most valuable features are its access control and approval of access requests. The self-service password reset feature is efficient. Role management capabilities streamline user access by assigning and revoking roles."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then."
"It should support XWindows Remote Desktop Access protocol for Linux/Unix."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"Reports to the end user."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"How the accounts are presented in the solution's UI can be improved."
"A lack of startup connectors to different systems, and could have better connectors for SAP IDM."
"One of the areas for improvement in the solution is its user interface which needs to be up-to-date and fancier, in particular, have better visualization in terms of the tabs and buttons. The user interface of SAP Identity Management should be improved based on the latest trends."
"I find SAP Identity Management complicated to use. Maintaining it is also complex."
"SAP Identity Management can improve risk analysis and authority checks."
"I have encountered issues with the host authentication feature."
"Research and marketing need to be improved."
"It needs to have the SSO for the HANA modules that SAP is releasing."
"The pricing could be better."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while SAP Identity Management is ranked 12th in Identity Management (IM) with 13 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while SAP Identity Management is rated 7.8. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of SAP Identity Management writes "Allows for seamless integration and provides a unified login experience ". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas SAP Identity Management is most compared with SailPoint IdentityIQ, Microsoft Identity Manager, SAP Customer Data Cloud, Saviynt and Omada Identity.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.