BeyondTrust Password Safe and CyberArk Endpoint Privilege Manager compete in the privileged access management category. CyberArk is often perceived as having the upper hand due to its comprehensive feature set that suits complex environments.
Features: BeyondTrust Password Safe offers automated password management, streamlined audit capabilities, and user-friendly interfaces. CyberArk Endpoint Privilege Manager provides extensive integrations, detailed privilege control, and a wide array of features for complex environments.
Room for Improvement: BeyondTrust could improve flexibility in reporting, reduce performance issues, and enhance the scalability of its solutions. CyberArk users look for better navigation, quicker response times, and reduced complexity in its feature utilization.
Ease of Deployment and Customer Service: BeyondTrust users generally find deployment straightforward, supported by responsive customer service that aids in troubleshooting. CyberArk users face a steeper learning curve during implementation but benefit from in-depth technical support crucial for complex integrations.
Pricing and ROI: BeyondTrust Password Safe is noted for cost-effectiveness and clear ROI, aligning well with the investment made. CyberArk is considered more expensive, yet its comprehensive features are said to justify the cost, providing significant ROI through enhanced security.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
The tickets for minor issues have been resolved efficiently.
I found the technical support from BeyondTrust to be very good.
The technical support from BeyondTrust responds very shortly whenever a ticket is created.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
If using the built-in database, it requires good knowledge in Microsoft SQL, which could complicate scalability.
In my experience, the scalability of BeyondTrust Password Safe is also a nine.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
The solution is very stable.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
This would help in identifying suspicious activities immediately when users log in.
There are limitations when accessing or creating connectors for each application.
I believe one improvement could be having the last used passwords appear more automatically whenever I check for passwords associated with a frequently used system.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
The pricing model is more affordable with the option of going for either unlimited devices or users.
Pricing is managed by a different team, however, I know it's less expensive than CyberArk Privilege Access.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
The flexibility of the licensing model is significantly better as it offers both unlimited users and unlimited devices, unlike Delinea, which is based on the number of users.
The features I find valuable in Password Safe include password retention and management, session privilege monitoring, live monitoring and recording, and the use of PS automation scripts for creating connections.
The most valuable features of BeyondTrust Password Safe, in my opinion, are its ease of use and robust security management.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
The most valuable feature is the ability to control users with admin rights.
Beyond Trust Password Safe is an automated solution that combines password and privileged session management into a single platform. Password Safe delivers secure access control, auditing, alerting, recording, and monitoring.
This free and open-source password manager supports Windows and Linux, and some ports are available for other platforms as well. Their proprietary algorithm, Twofish, is considered highly secure, with the advantage that it is not affiliated with NIST. The Twofish algorithm secures the data while keys are delivered using SHA-256 authentication.
The application is easy to use, and you can download the Windows app from several sites. Additionally, the application is available in 14 languages.
Beyond Trust Password Safe Key Features
What can you do with Password Safe?
Beyond Trust Password Safe Benefits
Reviews from Real Users
A PAM Architect at a tech services company says, "BeyondTrust Password Safe's features that I have found most valuable are really those that are knitted in. That is their Smart Rules and Smart Groups, where you design your administration model so you create your AD groups and your asset groups, and configure Password Safe."
An I.S. Architect at a insurance company mentions that "Session recording, password rotation, and password vaulting are the most valuable features."
"One of the most valuable features is that this is a product designed with enterprises in mind," adds a Cybersecurity Architect at a tech vendor.
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.