IT Central Station is now PeerSpot: Here's why

BeyondTrust Endpoint Privilege Management vs Symantec Privileged Access Manager comparison

Cancel
You must select at least 2 products to compare!
Featured Review
Buyer's Guide
BeyondTrust Endpoint Privilege Management vs. Symantec Privileged Access Manager
July 2022
Find out what your peers are saying about BeyondTrust Endpoint Privilege Management vs. Symantec Privileged Access Manager and other solutions. Updated: July 2022.
620,600 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It is straightforward. It is a good technology, and it is made to do one single thing.""It's relatively straightforward to set up, especially if you are deploying to the cloud.""BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc.""The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us.""What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy.""Technical support is good."

More BeyondTrust Endpoint Privilege Management Pros →

"Comprehensive coverage of the required features for the PAM solution.""It's easy to use and easy to configure."

More Symantec Privileged Access Manager Pros →

Cons
"Their technical support could be more responsive and helpful.""What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way.""Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful.""They need to come up with better integrative options which should be customer-centric.""If you don't get the implementation right at the outset, you will struggle with the product.""They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment."

More BeyondTrust Endpoint Privilege Management Cons →

"The response time for support could be faster. Some features should be added: cloud-based, VPN-less, more secure, and it should be adjusted in a hybrid environment.""The management console could be improved."

More Symantec Privileged Access Manager Cons →

Pricing and Cost Advice
  • "Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
  • "Its pricing and licensing are okay. We were in the perpetual model when it was on-prem, and now, with the SaaS service, we have a subscription model. As a customer, I would always like to see a lower price, but it seems to be priced at the right model currently, and we are trying to get the maximum benefits out of it."
  • More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →

  • "The version we are using is affordable compared to BeyondTrust, which is maybe three to four times as expensive, but it depends on the features."
  • More Symantec Privileged Access Manager Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    620,600 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpoint… more »
    Top Answer:It's relatively straightforward to set up, especially if you are deploying to the cloud.
    Top Answer:The licensing is paid on a yearly basis. I can't speak, however, to the actual cost of the solution.
    Top Answer:Comprehensive coverage of the required features for the PAM solution.
    Top Answer:I think the management console could be improved. I have just watched a demo video for the management console and I think it may need to be simplified. I haven't yet had hands-on experience with the… more »
    Top Answer:Our clients are generally enterprise businesses, mainly in the financial sectors. We are resellers and I'm head of the security business unit.
    Ranking
    Views
    7,289
    Comparisons
    4,914
    Reviews
    4
    Average Words per Review
    1,091
    Rating
    8.5
    Views
    2,856
    Comparisons
    2,027
    Reviews
    1
    Average Words per Review
    767
    Rating
    5.0
    Comparisons
    Also Known As
    BeyondTrust PowerBroker, PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix
    CA PAM, Xceedium Xsuite, CA Privileged Access Manager
    Learn More
    Overview

    BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.

    Key Solutions Include:

    -ENTERPRISE PASSWORD SECURITY

    Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.

    -ENDPOINT LEAST PRIVILEGE

    Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.

    -SERVER PRIVILEGE MANAGEMENT

    Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.

    -A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS

    Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.

    Learn more at https://www.beyondtrust.com/privilege-management

    CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.  It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers

    Offer
    Learn more about BeyondTrust Endpoint Privilege Management
    Learn more about Symantec Privileged Access Manager
    Sample Customers
    Aera Energy LLC, Care New England, James Madison University
    NEOVERA, Telesis, eSoft
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company25%
    Comms Service Provider14%
    Financial Services Firm7%
    Government6%
    REVIEWERS
    Retailer20%
    Financial Services Firm20%
    Logistics Company15%
    Government10%
    VISITORS READING REVIEWS
    Comms Service Provider26%
    Computer Software Company24%
    Financial Services Firm8%
    Government7%
    Company Size
    REVIEWERS
    Small Business56%
    Midsize Enterprise6%
    Large Enterprise39%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise15%
    Large Enterprise65%
    REVIEWERS
    Small Business27%
    Midsize Enterprise5%
    Large Enterprise68%
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise13%
    Large Enterprise69%
    Buyer's Guide
    BeyondTrust Endpoint Privilege Management vs. Symantec Privileged Access Manager
    July 2022
    Find out what your peers are saying about BeyondTrust Endpoint Privilege Management vs. Symantec Privileged Access Manager and other solutions. Updated: July 2022.
    620,600 professionals have used our research since 2012.

    BeyondTrust Endpoint Privilege Management is ranked 6th in Privileged Access Management (PAM) with 6 reviews while Symantec Privileged Access Manager is ranked 13th in Privileged Access Management (PAM) with 2 reviews. BeyondTrust Endpoint Privilege Management is rated 8.6, while Symantec Privileged Access Manager is rated 5.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "A simple and flexible solution for controlling the access and improving the security posture". On the other hand, the top reviewer of Symantec Privileged Access Manager writes "Allows IT and consultants to access the infrastructure environment but needs more security and better support". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Privileged Access Manager, CyberArk Endpoint Privilege Manager, Delinea Secret Server, Cisco ISE (Identity Services Engine) and Oracle Identity Governance, whereas Symantec Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, ARCON Privileged Access Management, ForgeRock and BeyondTrust Privileged Remote Access. See our BeyondTrust Endpoint Privilege Management vs. Symantec Privileged Access Manager report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.