Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs Teleport comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 2, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Ranking in Privileged Access Management (PAM)
9th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
32
Ranking in other categories
Anti-Malware Tools (13th)
Teleport
Ranking in Privileged Access Management (PAM)
13th
Average Rating
8.6
Reviews Sentiment
5.0
Number of Reviews
3
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (19th)
 

Mindshare comparison

As of January 2026, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Endpoint Privilege Management is 2.8%, down from 4.1% compared to the previous year. The mindshare of Teleport is 3.3%, up from 2.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
BeyondTrust Endpoint Privilege Management2.8%
Teleport3.3%
Other93.9%
Privileged Access Management (PAM)
 

Featured Reviews

Md Abdul Hakim - PeerSpot reviewer
System Engineer at Corporate Projukti Limited
Offers solid performance and user adaptability but needs better pricing options and local support
BeyondTrust is a strong, compliance-driven solution with excellent market recognition (Gartner, Peers, etc.), making it appealing for Bangladeshi enterprises. However, some key improvements could accelerate adoption: Areas for Improvement: Pricing & Local Affordability While the product’s capabilities justify its value, cost remains a barrier for many Bangladeshi organizations. Competitive pricing or regional discounts would make it more accessible. Local Support & Partnerships Currently, lack of local partners or trainers creates delays in support, implementation, and pricing negotiations. Establishing a Bangladesh-based support team or authorized resellers would improve responsiveness and trust. Enhanced Onboarding & Training Offering localized training programs (in Bengali/English) and documentation would help IT teams deploy and manage the solution more efficiently. Recommendations for Next Release: Introduce tiered pricing for emerging markets like Bangladesh. Develop a partner network in Bangladesh for faster service and sales. Add simplified dashboards for easier monitoring by non-technical staff. Final Note: BeyondTrust is already a top-tier PAM solution, but addressing these gaps would solidify its leadership in Bangladesh’s growing cybersecurity market.
PradeepKumar15 - PeerSpot reviewer
Test lead at a outsourcing company with 5,001-10,000 employees
Automation has improved uptime and manages hundreds of uplinked TV channels reliably
With the help of Teleport, we are managing many channels. I find it easy to manage how to uplink the channels, and we are automating many things in our setups. We have an MCR, an automatic NMS, and a data center. We have managed it well to make life easier for my employees and colleagues. Teleport has helped us minimize incidents and maintain our uplinking time and uptime. Our organization's uptime is 99.90%, which is almost 100%. With Teleport, we can achieve this uptime by using the best equipment and best automation systems, such as alarms. We have applied DataMiner, Barco systems for alarming, and DataMiner for managing the RF things. We have applied many systems in Teleport.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"It scales easily and the product is stable."
"AI adds value by automating the onboarding of assets and using smart rules to assign privileges."
"Scalability is good. I would rate the scalability a nine out of ten."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"BeyondTrust Endpoint Privilege Management positively impacts the organization by providing more security and benefits, such as ensuring that if modifications are made, we can see where mistakes occurred in the recording video."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"I recommend it for its straightforward setup and strong security features."
"Teleport has helped us minimize incidents and maintain our uplinking time and uptime, and our organization's uptime is 99.90%, which is almost 100%."
"Teleport has replaced earlier methods like a bastion server or a jump server, which required connecting to physical servers."
"I would definitely advise others looking into using Teleport to try it out if they are seeking a tunneling or proxying solution to streamline obtaining access without dealing with DNS or SSH, as it is straightforward to install, can be tested in various environments, and is a truly exceptional product that is easy to use."
 

Cons

"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"Reports to the end user."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment."
"It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then."
"Its feature for establishing workflows needs improvement."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"I cannot download or share session recordings directly with others, which would be useful for documentation or reviews."
"Teleport is simple to use, but sometimes it requires extra research for more unique tasks, which slightly detracts from its overall quality."
"Managing 700 to 800 services is not easy."
"I cannot download or share session recordings directly with others, which would be useful for documentation or reviews."
 

Pricing and Cost Advice

"It was very expensive."
"What BeyondTrust was providing was user-based licensing which was a great benefit from the client point of view. Recently, I don't know why, the licensing model has been changed, and that is the reason that they have lost a bit of their edge when it comes to the PAM, against our competition. The asset-based licensing, from the user's point of view, is not beneficial. The licensing should be based on the users. The greater the number of users, the greater will be the load and the greater the scalability problems. I presume that is why the licensing model has changed."
"The product’s licensing is different for Windows, Linux, and Mac. The tool’s licensing is yearly."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten."
"I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions."
"This solution is expensive compared to its competitors."
"The solution's pricing is high."
"It is relatively more cost-effective compared to the competing product."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Manufacturing Company
10%
Computer Software Company
9%
Government
8%
Computer Software Company
14%
Comms Service Provider
14%
Financial Services Firm
12%
University
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise3
Large Enterprise15
No data available
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
BeyondTrust's pricing is premium but negotiable for Bangladesh. Expect 20-30% extra costs from currency/import factors. Start with modular licensing (EPM first), demand emerging market discounts, a...
What needs improvement with Teleport?
I cannot download or share session recordings directly with others, which would be useful for documentation or reviews. Additionally, while the backend worker can be upgraded, there is a limitation...
What is your primary use case for Teleport?
I use Teleport to replace the normal authentication mechanism as part of a zero-trust architecture. It is particularly useful because, in a remote environment, I cannot trust any devices. I can sha...
What advice do you have for others considering Teleport?
I rate Teleport nine out of ten. Security-wise, it is very secure and easy to use for remote access. I recommend it for its straightforward setup and strong security features.
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
No data available
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Information Not Available
Find out what your peers are saying about CyberArk, One Identity, Delinea and others in Privileged Access Management (PAM). Updated: January 2026.
881,082 professionals have used our research since 2012.