2018-06-24T08:17:00Z

What advice do you have for others considering BeyondTrust Endpoint Privilege Management?

Miriam Tover - PeerSpot reviewer
  • 0
  • 10
PeerSpot user
21

21 Answers

DS
MSP
Top 5
2024-02-08T07:38:07Z
Feb 8, 2024

The solution is doing a good job of enhancing the endpoint security posture by managing the overall application life cycle and helping us block unwanted applications. The solution's scanning feature helps identify the unmanaged accounts within the console itself. We do not have to do a DNA scan like CyberArk separately, which is a separate license. The solution's least privilege enforcement has helped us ensure access is given to only the required people. It is easy to maintain the solution. The solution helps identify the unmanaged accounts and then develop a plan for managing those transferred accounts, which were used as service accounts in multiple critical applications. Users should have an in-house person to manage the environment. If they completely depend upon the vendors, they might be unable to do things at the right pace. Overall, I rate the solution an eight out of ten.

Search for a product comparison
Sandeep Kundargi - PeerSpot reviewer
Real User
Top 10
2023-11-10T09:50:25Z
Nov 10, 2023

When evaluating this product, it's more effective to base the assessment on your specific use cases rather than comparing it to other products. If the product aligns with ninety percent of your use cases and meets your needs, it would strongly indicate that proceeding with this product is a favorable choice. Overall, I would rate it eight out of ten.

PO
Real User
Top 5Leaderboard
2023-09-04T07:30:50Z
Sep 4, 2023

I rate the solution a seven out of ten.

Pradeep Swain - PeerSpot reviewer
Real User
Top 10
2023-06-09T15:24:00Z
Jun 9, 2023

I would advise if you're using BeyondTrust Endpoint Privilege Management for the first time, seek professional services directly from BeyondTrust, not from a vendor or supplier role. Take professional services directly from BeyondTrust EPM. Overall, I would rate the solution an eight out of ten because I'm also missing something on the pricing side. I'm missing something on the configuration side. Those things are missing.

Lakshmi Prasada Reddy Nandyala - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-03-15T11:35:45Z
Mar 15, 2023

I would rate the solution an eight out of ten. You can deploy the solution to Azure, AWS, or on-premises. This solution will be very helpful for organizations for security purposes. The tool is very user-friendly. The solution’s graphic user interface is also very easy compared to other products.

Marlin B Pohlman - PeerSpot reviewer
Consultant
Top 20
2022-10-24T06:05:00Z
Oct 24, 2022

Hire someone who knows the standards and knows how to align the product against the standards. That ability is why you should buy this product. The product is really good for GDPR, HIPAA, and medical compliance. I also like it for risk reduction. I can take a customer that is non-compliant with 27001, an organization that failed their registrar audit, and get them to compliance with this product fairly quickly; in half a year. That's good. Policy changes could be easier and better aligned with HITRUST and GDPR, although we can do them. We don't do a whole lot of whitelisting since everything we do is regulated. Part of what I have to do is all my own policy changes for the HITRUST GDPR.

Learn what your peers think about BeyondTrust Endpoint Privilege Management. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.
Akash Jogbond - PeerSpot reviewer
Real User
Top 10
2022-04-11T18:20:16Z
Apr 11, 2022

We are a partner and we sell and support this EPM solution to other customers. We use both cloud and on-premises deployment options. I'd suggest new users go slow. Instead of going bold. It's a powerful solution. If I create a beautiful policy, the product will behave beautifully. However, if I create an ugly policy, the product will show its ugly face to you, as it's just a brainless bull running around. You have to give it a direction. Otherwise, it can harm you. Overall, I would rate the solution an eight out of ten.

NN
Real User
2022-01-31T17:21:00Z
Jan 31, 2022

I would advise going for the cloud-based solution. The cloud-based solution has come a long way from its initial stage. It is a very simplified solution. Their licenses are very straightforward, simple, and accommodating. The support has been really good, and their flexible policy model has really been instrumental in going for a stage-by-stage approach. You don't have to go all the way to impact your environment from day one. You can define your policies using their quick policy wizard and other processes to simplify your environment. You should proceed step-by-step to get rid of the local admin and the environment. Evaluation with their simplistic and flexible model is going to make it much easier and faster for you to pick up the solution. I would rate it a nine out of 10. There is always a scope for improvement.

CD
Reseller
2021-10-12T10:47:21Z
Oct 12, 2021

It is mainly deployed on-prem. About 95% of the sales that I do are on-prem solutions. That's because we're talking about security. It is a good technology. I would definitely recommend this solution. I would never sell it if I can't recommend it. I would give it an eight out of 10.

OB
Real User
2021-07-01T16:44:19Z
Jul 1, 2021

We are a customer and an end-user. I'm not sure which version of the solution we're on right now. I cannot speak to the exact version number we are using. I would definitely recommend the product to other companies and users. For us, it's a very important organizational tool. Overall, I would rate it at an eight out of ten. We're mostly quite satisfied with its capabilities.

GJ
MSP
Top 10
2021-01-29T15:35:19Z
Jan 29, 2021

I would rate BeyondTrust Endpoint Privilege Management a nine out of ten.

LN
Reseller
2020-11-05T07:26:32Z
Nov 5, 2020

Overall, I'd rate the solution five out of ten. I would definitely recommend it, however, I would recommend organizations test a couple of solutions based on their requirements. There will be a different requirement for a retail outlet and a different requirement for an oil and gas company. Even though it is privileged remote access, different accesses most likely need to be granted. If somebody is a software developer, and somebody is just for support, they will need different types of access. Whether this solution offers that a company needs depends on different requirements from different end-users.

OS
Reseller
2020-01-29T11:24:00Z
Jan 29, 2020

This is a good solution that I would recommend, but in the Nigerian market, the price of this solution is challenging. Many companies are choosing competing solutions like CyberArk because the cost is lower. If the price were more friendly then it would have a better share of the market. I would rate this solution an eight out of ten.

OS
Reseller
2020-01-27T06:39:00Z
Jan 27, 2020

We're a BeyondTrust reseller. I'd recommend the solution. However, the pricing is not competitive and I find in the Nigerian market we're losing ground to CyberArk because the pricing is so unfriendly for the region. They need to try and match their competitors here in order to stay competitive overall in the market. I'd rate the solution eight out of ten.

AB
Consultant
2020-01-12T12:03:00Z
Jan 12, 2020

This program has a good reputation in the market and it is more required for the security of your infrastructure. It is a product that you can trust. The only thing I'm looking for in the next version is that the bug fixes have to be more frequent and the solution has to be more reliable and more flexible. On a scale from one to 10, I'll give it a six.

GK
Real User
2019-12-04T05:40:00Z
Dec 4, 2019

Approach it slowly. Don't rush in and drop things down there. Do it carefully, because you might end up breaking access to systems, which is complicated when you're running a production environment. Make sure you go through the testing process vigorously before you deploy. I would give BeyondTrust a seven out of ten. There are some features in CyberArk that are better, cheaper, or easier to implement. Some of those running in CyberArk don't have the conflicts that BeyondTrust has, as there are many products in the suite. You've got to compare apples with apples.

AI
Reseller
Top 5
2019-11-06T04:23:00Z
Nov 6, 2019

Don't start the implementation until you get the prerequisite sheet confirmed from the customer. If not, you may waste a lot of time at the customer's site. I have learned a couple of things from this product. First, if the organization doesn't have a structured hierarchy of the work or the segregation of duties properly implemented, no matter what kind of security there is, it tends to fail. Operationally, it tends to fail. The tasks never get finished. BeyondTrust helps define those duties properly. That was one major thing. The other thing I learned is that PAM is not for an inexperienced person. Don't give a PAM solution to a company that is employing inexperienced people, because they will never understand the concept of security and why identity security is important. I would rate this solution as eight and a half or nine out of ten. I am not saying ten, only because of the limited choice of Windows. If it had alternate options available, I would give it a ten.

FA
Real User
2018-08-16T08:28:00Z
Aug 16, 2018

I would rate BeyondTrust at eight out of 10. It's not a 10 because the scalability and licensing have impacted us a lot. Of the two points that I have deducted: One is the non-flexibility on the pricing and one is the licensing model. When you launch a product in several markets like the European market, the Asian market, or the Russian market, you have to be very flexible when it comes to the pricing.

ST
Real User
2018-08-09T06:47:00Z
Aug 9, 2018

For a Windows/Linux/Unix mixed environment, it is a good product to management privilege account passwords to prevent security breaches.

ST
Real User
2018-07-10T06:21:00Z
Jul 10, 2018

Take care regarding the SQL database.

BS
Real User
2018-06-24T08:17:00Z
Jun 24, 2018

Implementation is simple, but privileged application support may need a lot of testing. Support may not be able to help due to a lack of understanding of your environment.

BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity. Key Solutions Include: -ENTERPRISE PASSWORD SECURITY Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged...
Download BeyondTrust Endpoint Privilege Management ReportRead more