We performed a comparison between BeyondTrust Endpoint Privilege Management and Saviynt based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"It scales easily and the product is stable."
"The features related to application elevate is amazing. It helped the company to remove almost all admin local users."
"The privileged access management into sensitive systems is very valuable. That includes control from the endpoint all the way through to the managing of passwords and credentials that are used by the person to access the sensitive information. It's very useful, because nobody ever really maintains passwords for those endpoint systems. It's maintained in the Dropbox password file."
"Reduces major vulnerabilities by removing local administrator privileges."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"The repository has many features where you can define primary and secondary owners."
"The product is flexible to use."
"It is a flexible tool because it works on JSON."
"This product works well out of the box and if you don’t want to do a lot of configuration then this is the best tool."
"Saviynt risk-based access requests and intelligent access controls have made a significant impact on our company."
"The workflow in Saviynt is easier compared to other tools. It's pretty straightforward."
"We have found the implementation process to be very easy."
"It is very easy to use. It addresses most of the trends in identity governance and risk management."
"It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"It only has limited support for Mac."
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
"They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"Both SailPoint IdentityNow and Saviynt have some bugs, but SailPoint is considered more mature with fewer bugs due to its longer establishment in the market since around 2005. SailPoint had its share of bugs in the early days, but they have resolved them over time, resulting in a stable product. Saviynt, on the other hand, was launched around 2013 or 2014 and is actively working to improve its product. Despite having some bugs, Saviynt is making progress and aims to build a stable product, but it is not there yet."
"The customer support and implementation services need to be improved."
"The biggest drawback is that for every change you want to make, you have to go back to them and ask for it."
"The product lacks a broad user base which makes it difficult sometimes to find answers to questions about the product."
"The main difficulty was the integration process itself. But we were able to kind of work through it and fix it. We tried integrating with our HR system and other IBM solutions, like Microsoft Identity Management."
"The company needs to do more to establish standard practices within the product itself that are common in the industry."
"The UI doesn’t enhance the user experience."
"It is time-consuming to troubleshoot issues."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 27 reviews while Saviynt is ranked 4th in Identity Management (IM) with 20 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while Saviynt is rated 7.4. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of Saviynt writes "Offers a good alerting system and integrates with SIEM solutions but main difficulty was the integration process". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and BeyondTrust Password Safe, whereas Saviynt is most compared with SailPoint IdentityIQ, Microsoft Entra ID, CyberArk Privileged Access Manager, Okta Workforce Identity and Microsoft Identity Manager.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.