CyberArk Endpoint Privilege Manager and BeyondTrust Privileged Remote Access compete in the privileged access management category. CyberArk has an advantage in feature set and pricing, while BeyondTrust is favored for its overall value and effectiveness.
Features: CyberArk Endpoint Privilege Manager is known for strong application control, fine privilege elevation, and detailed endpoint management. BeyondTrust Privileged Remote Access offers robust remote access capabilities, efficient session management tools, and effective operations in diverse networking environments.
Room for Improvement: CyberArk Endpoint Privilege Manager could improve integration with existing security systems, streamline its deployment learning curve, and enhance user interface intuitiveness. BeyondTrust Privileged Remote Access should focus on delivering feature updates more frequently, increasing support for less common systems, and expanding overall compatibility.
Ease of Deployment and Customer Service: CyberArk Endpoint Privilege Manager offers a structured deployment process but involves a steep learning curve; its customer service is noted for responsiveness. BeyondTrust Privileged Remote Access provides a simple deployment model and efficient customer service, ensuring ease during setup.
Pricing and ROI: CyberArk Endpoint Privilege Manager is deemed cost-effective with a substantial return on investment in critical endpoint management scenarios. BeyondTrust Privileged Remote Access, while perceived as higher priced, is worth the cost with its comprehensive remote access solutions and secure management features.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
Support now requires opening a ServiceNow ticket, which can be time-consuming.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
I would give it an eight or nine out of ten for scalability, possibly even a ten, as I do not see a limitation in scaling.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
Updates sometimes introduce bugs or issues, especially with non-English versions.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
BeyondTrust should focus on automating the update process to reduce unnecessary ticket creation.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
My experience with pricing, setup cost, and licensing is that it is expensive, yet not the most expensive in the market, so the price can be considered justifiable.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
The secure access must be audited live, ensuring patient data protection.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
The most valuable feature is the ability to control users with admin rights.
BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.
Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security.
Features include:
- Privileged Access Control: Enforce least privilege by giving users the right level of access.
- Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections.
- Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway.
- Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials.
- Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere.
- Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.