Try our new research platform with insights from 80,000+ expert users

BeyondTrust Password Safe vs CyberArk Endpoint Privilege Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.0
BeyondTrust Password Safe offers strong security and compliance benefits, valued for deployment ease, despite high costs and varied ROI.
Sentiment score
7.0
CyberArk Endpoint Privilege Manager boosts security, saves resources, and enhances confidence, offering a perceived positive ROI despite quantification challenges.
Next year, we may add another BeyondTrust element because the overall experience has been good.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
I consider CyberArk Endpoint Privilege Manager's return on investment to be good since it effectively accomplishes the goals expected from privilege access management solutions.
 

Customer Service

Sentiment score
6.9
BeyondTrust Password Safe support is responsive, professional, globally praised but needs documentation improvements and better international team performance.
Sentiment score
6.6
CyberArk Endpoint Privilege Manager support is generally rated high, with quick resolutions but concerns about response times and accessibility.
The tickets for minor issues have been resolved efficiently.
One person gets aligned for troubleshooting and maintenance activities during their downtime, and within an hour, they complete these tasks.
I found the technical support from BeyondTrust to be very good.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
 

Scalability Issues

Sentiment score
7.6
BeyondTrust Password Safe is highly rated for scalability and flexibility with effective resource management and adaptable deployment across environments.
Sentiment score
7.7
CyberArk Endpoint Privilege Manager efficiently scales for varied environments, supporting small to large enterprises with a distributed cloud-based architecture.
If using the built-in database, it requires good knowledge in Microsoft SQL, which could complicate scalability.
BeyondTrust Password Safe is scalable and stable from my perspective, as if you increase your CPU and RAM, you can use as many user licenses as you want on a single platform.
In my experience, the scalability of BeyondTrust Password Safe is also a nine.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
 

Stability Issues

Sentiment score
7.6
BeyondTrust Password Safe is stable, praised for flexibility, with issues in early versions and necessary management for optimal performance.
Sentiment score
8.2
CyberArk Endpoint Privilege Manager is stable and reliable, maintaining 99.99% uptime with rare issues and smooth offline adaptation.
The solution is very stable.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
 

Room For Improvement

BeyondTrust Password Safe requires improved documentation, integration, interface simplicity, flexible features, and more competitive pricing to enhance user experience.
CyberArk Endpoint Privilege Manager requires improvements in UI, integration, performance, support, threat detection, customization, pricing flexibility, and automation.
This would help in identifying suspicious activities immediately when users log in.
There are limitations when accessing or creating connectors for each application.
SaaS-based applications and other things should be included, along with their password management options for web applications.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
 

Setup Cost

BeyondTrust Password Safe offers cost-effective, asset-based pricing, benefiting organizations prioritizing asset management over user count.
CyberArk Endpoint Privilege Manager is costly but considered reasonable for its features, with significant discounts for large enterprises.
The pricing model is more affordable with the option of going for either unlimited devices or users.
Pricing is managed by a different team, however, I know it's less expensive than CyberArk Privilege Access.
My experience with the pricing, setup cost, and licensing of BeyondTrust Password Safe is good because we have an asset-based license, not a user-based one, allowing us to add many clients with privilege access.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
 

Valuable Features

BeyondTrust Password Safe offers robust password management, integration, and analytics for enhanced security and compliance in enterprise environments.
CyberArk Endpoint Privilege Manager enhances security by managing privileges, reducing admin needs, and improving operational efficiency and data protection.
The flexibility of the licensing model is significantly better as it offers both unlimited users and unlimited devices, unlike Delinea, which is based on the number of users.
The features I find valuable in Password Safe include password retention and management, session privilege monitoring, live monitoring and recording, and the use of PS automation scripts for creating connections.
The most valuable features of BeyondTrust Password Safe, in my opinion, are its ease of use and robust security management.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
 

Categories and Ranking

BeyondTrust Password Safe
Ranking in Privileged Access Management (PAM)
11th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
26
Ranking in other categories
Enterprise Password Managers (7th)
CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
4th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Anti-Malware Tools (5th), Application Control (5th), Ransomware Protection (6th)
 

Mindshare comparison

As of June 2025, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Password Safe is 3.0%, up from 2.5% compared to the previous year. The mindshare of CyberArk Endpoint Privilege Manager is 3.4%, down from 3.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Ali Hatamleh - PeerSpot reviewer
Smart tooling streamlines account organization and access through advanced grouping features
The features I find valuable in Password Safe include password retention and management, session privilege monitoring, live monitoring and recording, and the use of PS automation scripts for creating connections. The smart tooling and smart group features are also important as, after finalizing discovery, they auto-collect accounts in the environment and organize them in Smart Groups for easy access.
Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
859,438 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
15%
Manufacturing Company
9%
Government
8%
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your experience regarding pricing and costs for BeyondTrust Password Safe?
My experience with BeyondTrust Password Safe's pricing, setup cost, and licensing has been positive, primarily due to its asset-based licensing model. This is a significant advantage for us because...
What needs improvement with BeyondTrust Password Safe?
While generally a strong product, BeyondTrust Password Safe has a few areas that could use some polish. From an administrator's viewpoint, we sometimes see keystroke capturing fail. More significan...
What is your primary use case for BeyondTrust Password Safe?
The main purpose of BeyondTrust Password Safe is for Privileged Access Management, with session monitoring being very effective for risk mitigation. It ensures we adhere to the control standards se...
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
 

Also Known As

BeyondTrust PowerBroker Password Safe
Viewfinity
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Information Not Available
Find out what your peers are saying about BeyondTrust Password Safe vs. CyberArk Endpoint Privilege Manager and other solutions. Updated: June 2025.
859,438 professionals have used our research since 2012.