Try our new research platform with insights from 80,000+ expert users

BeyondTrust Password Safe vs CyberArk Endpoint Privilege Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.0
BeyondTrust Password Safe offers mixed ROI; praised for security and compliance benefits, but cost and delayed returns concern some users.
Sentiment score
6.9
CyberArk Endpoint Privilege Manager enhances security, reduces breach vulnerabilities, and saves resources, yielding around $10,000 in value.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
 

Customer Service

Sentiment score
6.8
BeyondTrust Password Safe's service receives mixed reviews, with praise for support responsiveness and criticism for documentation and resolution delays.
Sentiment score
6.6
CyberArk support is effective but inconsistent; response times vary and complex processes can frustrate users despite helpful resources.
The tickets for minor issues have been resolved efficiently.
I found the technical support from BeyondTrust to be very good.
The technical support from BeyondTrust responds very shortly whenever a ticket is created.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
 

Scalability Issues

Sentiment score
7.6
BeyondTrust Password Safe is praised for its scalable, adaptable infrastructure, efficiently supporting enterprises with active-active architecture.
Sentiment score
7.7
CyberArk Endpoint Privilege Manager scales efficiently for device management but requires careful planning for large configurations, users report.
If using the built-in database, it requires good knowledge in Microsoft SQL, which could complicate scalability.
In my experience, the scalability of BeyondTrust Password Safe is also a nine.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
 

Stability Issues

Sentiment score
7.6
BeyondTrust Password Safe is praised for reliability and flexibility, though initial issues improved; users recommend updates for competitive parity.
Sentiment score
8.2
CyberArk Endpoint Privilege Manager is stable with minor issues, better Windows performance, and requires frequent server restarts.
The solution is very stable.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
 

Room For Improvement

BeyondTrust Password Safe needs better integration, documentation, user experience, and support while addressing pricing and deployment challenges.
CyberArk Endpoint Privilege Manager needs improved interface, integration, performance, support, pricing, threat detection, compatibility, automation, and synchronization.
This would help in identifying suspicious activities immediately when users log in.
There are limitations when accessing or creating connectors for each application.
I believe one improvement could be having the last used passwords appear more automatically whenever I check for passwords associated with a frequently used system.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
 

Setup Cost

BeyondTrust Password Safe offers competitive, asset-based pricing and flexible renewals, providing justified cost advantages over CyberArk.
CyberArk Endpoint Privilege Manager is costly but offers quality features, making it appealing for large enterprises in finance.
The pricing model is more affordable with the option of going for either unlimited devices or users.
Pricing is managed by a different team, however, I know it's less expensive than CyberArk Privilege Access.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
 

Valuable Features

BeyondTrust Password Safe offers session recording, password management, integration, high availability, and customization for enhanced security and efficiency.
CyberArk Endpoint Privilege Manager enhances security with features like DNS scanning, admin access delegation, ransomware protection, and threat detection.
The flexibility of the licensing model is significantly better as it offers both unlimited users and unlimited devices, unlike Delinea, which is based on the number of users.
The features I find valuable in Password Safe include password retention and management, session privilege monitoring, live monitoring and recording, and the use of PS automation scripts for creating connections.
The most valuable features of BeyondTrust Password Safe, in my opinion, are its ease of use and robust security management.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
The most valuable feature is the ability to control users with admin rights.
 

Categories and Ranking

BeyondTrust Password Safe
Ranking in Privileged Access Management (PAM)
7th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
24
Ranking in other categories
Enterprise Password Managers (6th)
CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
3rd
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
36
Ranking in other categories
Endpoint Compliance (4th), Anti-Malware Tools (5th), Application Control (5th), Ransomware Protection (7th)
 

Mindshare comparison

As of May 2025, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Password Safe is 2.8%, up from 2.6% compared to the previous year. The mindshare of CyberArk Endpoint Privilege Manager is 3.6%, down from 3.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Gary Jolley - PeerSpot reviewer
Their discovery engine is off the charts, and the ease of administration and implementation they talk about is for real
It starts with discovery. Its number one feature is discovery. The discovery engine in BeyondTrust is off the charts. When they perform a discovery, you know everything there is about a server, including what software is installed. For example, if you want to group all of your database servers together, you can do that by using discovery and Smart Rules. If a server has Microsoft SQL installed, it gets put into a group based on a Smart Rule. It makes it very easy to determine what is what in your environment. As organizations grow or acquire other companies and merge, they lose track of what they have. BeyondTrust can help you throw a rope around it very rapidly. Its user interface is really nice. It is very visual. When you first log in, based on your job role, you see what you have access to when you look at the screen. As an administrator, I see the configuration screen where I can go in and modify Active Directory and authentication connections. I can set up SAML, or I also have access to create Smart Rules. The access is based on the role that you have when you log in. I have six boxes or six categories of administration items, whereas when an admin user connects, he would only have one or two. So, based on your role, you see what you have access to. It is not like you click something and then it fails because you're not an administrator at that level. You actually see what you have access to, and BeyondTrust is very good at that. BeyondTrust provides the ability to connect by using not just the web interface but also the admin tools such as MobaXterm, PuTTY, or a lengthy list of other types of tools. You can use the connection string and connect through BeyondTrust, and it will be session recorded, keystroke logged, and highly available. When you bring up MobaXterm, you probably bring up one of the most complex ones because MobaXterm has the ability to have two, three, or four concurrent connections, which makes BeyondTrust Password Safe ideal. It is very easy to integrate session management into existing business processes. To make it easy for the engineers, we created templates of the connection strings and then used, believe it or not, Microsoft Excel to create custom strings for each of the engineers. We exported them to a text file that they could then import. In the case of PuTTY, because PuTTY stores the connections and the credentials in the registry, we had to do something different there, but the connection string is customizable enough to make the job fast and easily repeatable for all the other engineers. You don't have 20 or 30 engineers spending two or three days creating all these connection strings. I can create them in a matter of minutes with a Microsoft Excel spreadsheet and then save them to a text file or a CSV file. It is awesome. We are able to integrate session management without disrupting business processes. One of the niceties about BeyondTrust is the ability to integrate it with ticketing systems. For example, as per Sarbanes-Oxley, we have to have a reason for why an administrator is performing something. The integration with a ticketing system is ideal rather than manually typing the reason in the reason field through the GUI where most engineers, after a while, end up just typing in Work. They don't put in enough data to make it clearly visible why they connected. The integration with the ticketing system is ideal for that. Ticket-driven access makes the work very quantifiable.
Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
16%
Government
9%
Manufacturing Company
9%
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your experience regarding pricing and costs for BeyondTrust Password Safe?
Pricing is managed by a different team, however, I know it's less expensive than CyberArk Privilege Access. BeyondTrust's pricing for the cloud platform is affordable.
What needs improvement with BeyondTrust Password Safe?
I believe one improvement could be having the last used passwords appear more automatically whenever I check for passwords associated with a frequently used system.
What is your primary use case for BeyondTrust Password Safe?
I find that BeyondTrust Password Safe is a very effective application for password management. I find it very easy to use and update.
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost. It's really one of the best solutions.
 

Also Known As

BeyondTrust PowerBroker Password Safe
Viewfinity
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Information Not Available
Find out what your peers are saying about BeyondTrust Password Safe vs. CyberArk Endpoint Privilege Manager and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.