No more typing reviews! Try our Samantha, our new voice AI agent.

BeyondTrust Password Safe vs KeeperPAM comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust Password Safe
Ranking in Privileged Access Management (PAM)
9th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
27
Ranking in other categories
Enterprise Password Managers (10th)
KeeperPAM
Ranking in Privileged Access Management (PAM)
21st
Average Rating
8.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2026, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Password Safe is 2.7%, down from 2.8% compared to the previous year. The mindshare of KeeperPAM is 1.6%, up from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
BeyondTrust Password Safe2.7%
KeeperPAM1.6%
Other95.7%
Privileged Access Management (PAM)
 

Featured Reviews

PawanShirose - PeerSpot reviewer
Associate Security Consultant at CyberSec Consulting
Has enabled bulk onboarding and password rotation while ensuring secure privilege management
I have faced stability issues when upgrading BeyondTrust Password Safe solution. The upgrade process can be lengthy compared to other modules. For example, upgrading the appliance and reconfiguring HA is easier in PRA. However, in BeyondTrust Password Safe, the upgrade activity can take longer, and I have occasionally experienced being stuck during appliance version upgrades, sometimes duplicating the upgrade. Regarding additional features, we have good features in BeyondTrust Password Safe compared to other modules, such as Secret Safe to secure secrets and the check-in, check-out functionality. We already have the main features, but I think it would be helpful if BeyondTrust implemented a heartbeat check feature on the privileged account level. This feature would allow PAM to check the credentials of privileged accounts, indicating if they are correct or not, showing if the heartbeat has failed if they are wrong.
Mahesh-Subramanian - PeerSpot reviewer
Vice President at Chargebacks911
Offers security audit that shows us how many passwords are weak and how often they're being changed
There are a couple of things. One is the BreachWatch feature. It's one of the most useful things because it shows us who on our team has weak or compromised passwords. So, it checks the passwords and helps improve them. There's also a security audit that shows us how many passwords are weak and how often they're being changed. Some people haven't changed their passwords for months, even though applications force them to change every 45 or 90 days. So you can catch those issues and warn them. Most applications allow for rotation, but some don't. I've seen people use the same password for years. At least Keeper tells us these passwords haven't been rotated, and we can warn them to change them manually since we can't force people to change the password.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is the architecture capabilities, which allow designated server components for high availability and failover. It works well with identity and access management solutions, allowing users to be automatically onboarded and offboarded. The account mapping feature makes rollout seamless. The session monitoring capabilities are excellent, with keystroke and graphical monitoring. This enhanced our security posture by providing detailed accounts of user actions. It helped us pass our SOX audits."
"It provides integrated password and session management in one solution, which is important for us because, from an auditing standpoint, we are accountable for the type of access being used. We need to ensure that accounts are securely stored and there is the right type of accountability around who is gaining the access. After gaining it, how they're using it, where they're using it, etc."
"The product has improved security and login due to the system recordings. In case, there is a doubt that someone has done something which they shouldn't have been doing, we can just go back and check what the user actually did."
"I like the session recording feature. I also like the analytics and reports. You can pull up a report, and the UI is fantastic. The system is recording when nobody's there, so we have a record of what's happening."
"Its number one feature is discovery. The discovery engine in BeyondTrust is off the charts. When they perform a discovery, you know everything there is about a server, including what software is installed. For example, if you want to group all of your database servers together, you can do that by using discovery and Smart Rules. If a server has Microsoft SQL installed, it gets put into a group based on a Smart Rule. It makes it very easy to determine what is what in your environment. As organizations grow or acquire other companies and merge, they lose track of what they have. BeyondTrust can help you throw a rope around it very rapidly."
"Team Passwords gives us better control over our passwords."
"Overall, I rate the solution ten out of ten."
"The CI/CD and REST API are also satisfactory; the solution has a full PAM feature set and they all work well."
"BreachWatch feature is one of the most useful things because it shows us who on our team has weak or compromised passwords."
 

Cons

"We didn't see a return on our investment."
"Named accounts don't work well in this solution. If you use named accounts for your administrative access, the way Smart Rules work is that it takes your SAM account name and matches it to the account name of your privileged ID, which creates limitations on size and how big those names can be because the directory has a 20-character limit."
"From the client perspective, they usually complain that the RDP session disconnects without error notifications."
"There is a limited capacity on the appliance, which I wasn't informed about when I purchased the product. I can have a maximum of 150 rules per appliance; any more than that and rule processing becomes very complex, especially regarding password revision. Hitting a capacity limit you don't know about can be problematic. Ideally, we would not have a limited capacity, allowing us to be in a completely managed state with password rotation for every service account, not just the highly privileged ones."
"If there was one thing, it would be having the documentation standardized."
"We don't have much control over the appliance. When anything happens in the backend, we have to depend on the support team. We need to raise a case so that they can update the appliance. If we have control over it, we would be able to troubleshoot easily."
"The initial server implementation tasks could be easier to process."
"There is a limited capacity on the appliance, which I wasn't informed about when I purchased the product. I can have a maximum of 150 rules per appliance; any more than that and rule processing becomes very complex, especially regarding password revision."
"The final implementation was challenging because we had to roll it out to three different departments within the same umbrella, each with its own domains."
 

Pricing and Cost Advice

"It has subscription-based licensing. BeyondTrust is three times less expensive than CyberArk."
"At the time, BeyondTrust was significantly cheaper than CyberArk. Pricing-wise, if I remember correctly, it goes by assets. The pricing was negotiated for our instances based on the number of assets that we onboard into the system. It is a little different from CyberArk, where the pricing is by users. So, it depends. If you have a lot of assets, it can get very expensive."
"I would rate the pricing a seven out of ten, where one is cheap and ten is expensive."
"We just pay for Password Safe. Session management is included, but we don't use it. There aren't any additional costs besides the standard licensing fees. We pay for an annual license."
"The product is quite affordable."
"When you buy Password Safe and perform your initial Discovery, you have all these servers that are added to your assets in BeyondTrust, but you're not using a license until you actually start managing the systems. BeyondTrust's licensing is based on the systems when they're managed, which means when an administrator is able to connect to the server through BeyondTrust with a managed account. There would be a privileged account on the endpoint when the licensing starts. A significant advantage to that is that there are many organizations that want to evaluate their environment prior to automatic management."
"This solution is not cheap—it's a very expensive solution. Very, very expensive compared to the features and functions that they offer."
"The pricing structure is better than the competitors. It's much cheaper than CyberArk. They do the licensing on the basis of assets, not on the number of users. For CyberArk, they base the licensing on the number of users, and they have an expensive model of pricing. BeyondTrust has a cheaper model."
"It's good value for money."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
889,855 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
26%
Manufacturing Company
9%
Computer Software Company
6%
Government
6%
Financial Services Firm
14%
Media Company
10%
Computer Software Company
8%
Energy/Utilities Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business13
Midsize Enterprise5
Large Enterprise10
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for BeyondTrust Password Safe?
My experience with BeyondTrust Password Safe's pricing, setup cost, and licensing has been positive, primarily due to its asset-based licensing model. This is a significant advantage for us because...
What needs improvement with BeyondTrust Password Safe?
I have faced stability issues when upgrading BeyondTrust Password Safe solution. The upgrade process can be lengthy compared to other modules. For example, upgrading the appliance and reconfiguring...
What is your primary use case for BeyondTrust Password Safe?
I am working on both BeyondTrust Password Safe and the PRA (Privileged Remote Access). I have three years plus experience working with BeyondTrust Password Safe solution, and I have hands-on, good ...
What needs improvement with KeeperPAM?
We had some challenges with the initial setup.
What is your primary use case for KeeperPAM?
We primarily use it to ensure that all our people store their passwords in KeeperPAM and do not have multiple sources for their passwords, including Excel. We also share passwords through KeeperPAM...
 

Also Known As

BeyondTrust PowerBroker Password Safe
No data available
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Information Not Available
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: March 2026.
889,855 professionals have used our research since 2012.