BeyondTrust Password Safe and CyberArk Identity are competing in privileged access management. BeyondTrust has the upper hand in session management with features like Smart Rules and discovery analytics, while CyberArk excels in identity management with its SSO and MFA capabilities.
Features: BeyondTrust includes Smart Rules for automatic account onboarding, integrated session and password management, and robust discovery and analytics capabilities. CyberArk offers robust password rotation, seamless SSO and MFA features, and integrates effectively with existing security frameworks.
Room for Improvement: BeyondTrust could improve its documentation, simplify database onboarding, and enhance error reporting insights. Users suggest refining Smart Rules capacity and reporting interfaces. CyberArk needs to enhance its GUI usability, improve third-party system integration, and user governance. It also requires better cloud adoption, scalability, and streamlined federation capabilities.
Ease of Deployment and Customer Service: BeyondTrust is primarily on-premises with hybrid cloud options, noted for setup complexity but rated highly for customer support, with suggestions for faster problem resolution. CyberArk supports both cloud and private deployments, offering flexibility, but users highlight areas for support improvement in cloud scenarios, with a need for better documentation and quicker response times.
Pricing and ROI: BeyondTrust typically offers a cost-effective pricing model, appealing for larger deployments when priced by assets rather than users. Its subscription-based licensing offers value compared to other market players. CyberArk is considered expensive, with a premium price reflecting its comprehensive service offerings. Both solutions provide ROI through compliance support and security enhancements.
By the second month, we started seeing the benefits and achieved a return on investment.
The tickets for minor issues have been resolved efficiently.
I found the technical support from BeyondTrust to be very good.
The technical support from BeyondTrust responds very shortly whenever a ticket is created.
They resolved the problem immediately after I reported it, on the same day, within one hour.
I have had conversations with them twice, and their technical support team was not that good.
There are times when there is a delay in handling my inquiries via email.
If using the built-in database, it requires good knowledge in Microsoft SQL, which could complicate scalability.
In my experience, the scalability of BeyondTrust Password Safe is also a nine.
We can use it on different phones and computers, demonstrating its scalability.
By addressing the issues I have highlighted, such as stability and making it bug and lag-free, along with improving customer support, they can enhance its scalability.
The solution is very stable.
When you have it in the cloud, you have CyberArk every time you need it.
There is a timeout period that I do not like, requiring repeated verification.
With respect to stability, I find that stability is very good.
This would help in identifying suspicious activities immediately when users log in.
There are limitations when accessing or creating connectors for each application.
I believe one improvement could be having the last used passwords appear more automatically whenever I check for passwords associated with a frequently used system.
Integration or deployment is extremely difficult for CyberArk Identity.
Something they could improve is the management of multifactor authentication.
To enhance the product, they can consider improving the user interface of the software.
The pricing model is more affordable with the option of going for either unlimited devices or users.
Pricing is managed by a different team, however, I know it's less expensive than CyberArk Privilege Access.
I compared it with other products, and it does not require a heavy investment.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
The flexibility of the licensing model is significantly better as it offers both unlimited users and unlimited devices, unlike Delinea, which is based on the number of users.
The features I find valuable in Password Safe include password retention and management, session privilege monitoring, live monitoring and recording, and the use of PS automation scripts for creating connections.
The most valuable features of BeyondTrust Password Safe, in my opinion, are its ease of use and robust security management.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
It protects our platform, application, network, and infrastructure resources on any device.
It is the most powerful access management system.
Beyond Trust Password Safe is an automated solution that combines password and privileged session management into a single platform. Password Safe delivers secure access control, auditing, alerting, recording, and monitoring.
This free and open-source password manager supports Windows and Linux, and some ports are available for other platforms as well. Their proprietary algorithm, Twofish, is considered highly secure, with the advantage that it is not affiliated with NIST. The Twofish algorithm secures the data while keys are delivered using SHA-256 authentication.
The application is easy to use, and you can download the Windows app from several sites. Additionally, the application is available in 14 languages.
Beyond Trust Password Safe Key Features
What can you do with Password Safe?
Beyond Trust Password Safe Benefits
Reviews from Real Users
A PAM Architect at a tech services company says, "BeyondTrust Password Safe's features that I have found most valuable are really those that are knitted in. That is their Smart Rules and Smart Groups, where you design your administration model so you create your AD groups and your asset groups, and configure Password Safe."
An I.S. Architect at a insurance company mentions that "Session recording, password rotation, and password vaulting are the most valuable features."
"One of the most valuable features is that this is a product designed with enterprises in mind," adds a Cybersecurity Architect at a tech vendor.
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
We monitor all Enterprise Password Managers reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.