Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs Trellix Endpoint Security Platform comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.9
Organizations benefit from BeyondTrust by enhancing security, achieving compliance, reducing costs, and integrating zero-trust for increased ROI.
Sentiment score
8.0
Trellix Endpoint Security offers valuable ROI by reducing threats and costs, with high satisfaction despite some false positives.
Money saving is the main part because every organization tries to reduce their costs.
We have observed tremendous return on investment after implementing Trellix Endpoint Security as it is a more cost-effective solution compared to other products.
Clients appreciate the solution’s customization capabilities and ongoing product improvements.
There are two parts: one is the encryption which is standard and no AI is needed, but the data protection part could benefit from AI to detect new types of data and protect it.
 

Customer Service

Sentiment score
7.1
BeyondTrust support is efficient and knowledgeable, yet experiences delay issues, especially in Asia-Pacific, affecting user satisfaction.
Sentiment score
6.9
Trellix Endpoint Security Platform support is generally praised, though some users note response time inconsistencies and platform-specific service gaps.
Support is critical, especially when challenges arise related to PAM.
They offer support around the clock, and responses are generally quick.
BeyondTrust support is reliable.
The response time is a notable issue.
I would rate their customer service nine out of ten.
When we implemented Trellix Endpoint Security in their network, multiple malwares were detected.
 

Scalability Issues

Sentiment score
7.5
BeyondTrust Endpoint Privilege Management offers seamless scalability and reliability for organizations of any size, ensuring efficient user asset management.
Sentiment score
7.8
Trellix Endpoint Security efficiently scales across diverse environments, handling thousands of endpoints with seamless expansion and robust performance.
The initial understanding of the environment is crucial, followed by a simple deployment process.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
Trellix Endpoint Security is scalable.
 

Stability Issues

Sentiment score
7.6
Users commend BeyondTrust for stability and reliability, despite initial setup challenges and minor UI and integration issues.
Sentiment score
8.2
Trellix Endpoint Security Platform is stable, reliable, and handles high loads well, though some performance issues are acknowledged.
The appliances are stable, and there are no significant issues with backups or recovery.
I would rate its stability as nine out of ten.
I would rate the stability of Trellix Endpoint Security as near perfect, close to ten out of ten.
I think it's stable enough; earlier it had glitches, but now it's stable enough.
 

Room For Improvement

BeyondTrust Endpoint Privilege Management requires enhancements in security, integration, support, deployment, error management, pricing, and responsive customer service.
Users seek performance, UI, integration improvements in Trellix Endpoint Security, along with faster updates and better support.
The ability to view recorded live sessions of specific users is a crucial benefit.
There is a need for better MQ integration with DevOps and improvements in architecture.
This product is highly ranked on Gartner, Peers, and other review sites.
What needs improvement in Trellix Endpoint Security is the reduction of resource consumption by the scanning feature.
Improvements are needed in forensic analytics to detect specific vulnerabilities.
The product does not seem to be cloud-native.
 

Setup Cost

BeyondTrust Endpoint Privilege Management is seen as expensive due to licensing complexities and additional costs, especially for Mac clients.
Trellix Endpoint Security is competitively priced, offering flexible licensing and value, though renewal costs might increase over time.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
 

Valuable Features

BeyondTrust enhances security with privilege management, integration, session recording, and is valued for ease of use and scalability.
Trellix Endpoint Security provides advanced threat protection, ease of use, and customizable policies for effective ransomware and malware defense.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
When any unauthorized user makes an attempt, it notifies the administrators.
Administrators need a tool that provides visibility and clarity about endpoint management within the organization.
Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks.
Including options like Application Control (formerly Solidcore), integrated monitoring, change control, DLP, and advanced threat protection, the solution offers comprehensive security.
The detection capability of Trellix Endpoint Security is higher than traditional antivirus solutions.
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
31
Ranking in other categories
Privileged Access Management (PAM) (6th), Anti-Malware Tools (13th)
Trellix Endpoint Security P...
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
158
Ranking in other categories
Endpoint Protection Platform (EPP) (9th), Endpoint Detection and Response (EDR) (10th), Extended Detection and Response (XDR) (9th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. BeyondTrust Endpoint Privilege Management is designed for Privileged Access Management (PAM) and holds a mindshare of 3.8%, down 5.0% compared to last year.
Trellix Endpoint Security Platform, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 3.9% mindshare, down 4.3% since last year.
Privileged Access Management (PAM)
Endpoint Protection Platform (EPP)
 

Featured Reviews

Md Abdul Hakim - PeerSpot reviewer
Offers solid performance and user adaptability but needs better pricing options and local support
BeyondTrust is a strong, compliance-driven solution with excellent market recognition (Gartner, Peers, etc.), making it appealing for Bangladeshi enterprises. However, some key improvements could accelerate adoption: Areas for Improvement: Pricing & Local Affordability While the product’s capabilities justify its value, cost remains a barrier for many Bangladeshi organizations. Competitive pricing or regional discounts would make it more accessible. Local Support & Partnerships Currently, lack of local partners or trainers creates delays in support, implementation, and pricing negotiations. Establishing a Bangladesh-based support team or authorized resellers would improve responsiveness and trust. Enhanced Onboarding & Training Offering localized training programs (in Bengali/English) and documentation would help IT teams deploy and manage the solution more efficiently. Recommendations for Next Release: Introduce tiered pricing for emerging markets like Bangladesh. Develop a partner network in Bangladesh for faster service and sales. Add simplified dashboards for easier monitoring by non-technical staff. Final Note: BeyondTrust is already a top-tier PAM solution, but addressing these gaps would solidify its leadership in Bangladesh’s growing cybersecurity market.
Abdullah Al Hadi - PeerSpot reviewer
Customization capabilities allow clients to autonomously deploy policies
There are a few areas where Trellix Endpoint Security ( /categories/endpoint-protection-platform-epp ) can improve. Firstly, the high CPU utilization when agents are installed can negatively impact client systems. Another issue is with end-users outside the network, where the agent handler sometimes fails to deploy the product properly. Improvements are needed in forensic analytics to detect specific vulnerabilities. It would also help if detection specifics were identified more quickly and the problem-solving process accelerated, especially to meet larger clients' expectations.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
863,429 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Computer Software Company
14%
Manufacturing Company
10%
Government
6%
Government
14%
Manufacturing Company
13%
Computer Software Company
11%
Financial Services Firm
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
BeyondTrust's pricing is premium but negotiable for Bangladesh. Expect 20-30% extra costs from currency/import factors. Start with modular licensing (EPM first), demand emerging market discounts, a...
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deploy various components as desired with McAfee Endpoint Security, whereas many othe...
How does Crowdstrike Falcon compare with FireEye Endpoint Security?
The Crowdstrike Falcon program has a simple to use user interface, making it both an easy to use as well as an effective program. Its graphical design is such that it makes an extremely useful too...
What do you like most about McAfee Endpoint Security?
It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts.
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
McAfee Endpoint Security, McAfee Endpoint Protection, Intel Security Total Protection for Endpoint, McAfee Complete Endpoint Protection, Trellix Endpoint Security (ENS)
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
inHouseIT, Seagate Technology
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: July 2025.
863,429 professionals have used our research since 2012.