BeyondTrust Endpoint Privilege Management vs. DX Application Performance Management

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
BeyondTrust Endpoint Privilege Management
Score 9.7 out of 10
N/A
BeyondTrust Endpoint Privilege Management, powered by PowerBroker and Avecto reduces the risk of privilege abuse by eliminating unnecessary privileges, and can elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity.N/A
DX Application Performance Management
Score 9.0 out of 10
N/A
DX Application Performance Management (formerly CA APM, or CA Application Performance Management) is an application performance management platform designed to correlate and analyze data in real-time. DX APM supports hybrid environments and customizable failure thresholds.N/A
Pricing
BeyondTrust Endpoint Privilege ManagementDX Application Performance Management
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
BeyondTrust Endpoint Privilege ManagementDX Application Performance Management
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details——
More Pricing Information
Community Pulse
BeyondTrust Endpoint Privilege ManagementDX Application Performance Management
Top Pros
Top Cons
Features
BeyondTrust Endpoint Privilege ManagementDX Application Performance Management
Application Performance Management
Comparison of Application Performance Management features of Product A and Product B
BeyondTrust Endpoint Privilege Management
-
Ratings
DX Application Performance Management
3.7
6 Ratings
70% below category average
Application monitoring00 Ratings3.26 Ratings
Database monitoring00 Ratings3.24 Ratings
Threshold alerts00 Ratings3.26 Ratings
Predictive capabilities00 Ratings4.04 Ratings
Application performance management console00 Ratings3.26 Ratings
Collaboration tools00 Ratings4.03 Ratings
Out-of-the box templates to monitor applications00 Ratings4.05 Ratings
Application dependency mapping and thresholding00 Ratings4.05 Ratings
Virtualization monitoring00 Ratings4.04 Ratings
Server availability and performance monitoring00 Ratings3.24 Ratings
Server usage monitoring and capacity forecasting00 Ratings4.04 Ratings
IT Asset Discovery00 Ratings4.02 Ratings
Best Alternatives
BeyondTrust Endpoint Privilege ManagementDX Application Performance Management
Small Businesses

No answers on this topic

GitLab
GitLab
Score 8.6 out of 10
Medium-sized Companies
ManageEngine ADManager Plus
ManageEngine ADManager Plus
Score 9.5 out of 10
ManageEngine Site24x7
ManageEngine Site24x7
Score 9.7 out of 10
Enterprises
ManageEngine ADManager Plus
ManageEngine ADManager Plus
Score 9.5 out of 10
ManageEngine Site24x7
ManageEngine Site24x7
Score 9.7 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
BeyondTrust Endpoint Privilege ManagementDX Application Performance Management
Likelihood to Recommend
10.0
(7 ratings)
3.2
(6 ratings)
Usability
9.5
(2 ratings)
-
(0 ratings)
Support Rating
8.2
(1 ratings)
2.5
(2 ratings)
User Testimonials
BeyondTrust Endpoint Privilege ManagementDX Application Performance Management
Likelihood to Recommend
BeyondTrust
It is an absolute must in all organizations where security is taken seriously. For organizations where there is a tendency among the users' end to abuse access privileges, this tool comes in handy. It has features that would enable the administrator to look through video logs to see what was done by a specific user. Also has the capability to terminate or lock users/ user sessions.
Read full review
Broadcom
CA Wily is well suited for monitoring the load balanced application nodes and determine their main performance bottlenecks like if problem exists in heap or in some connection issues. But I think when it comes to providing the entire report of the application, it is less appropriate as there is no way to create the entire report of the test for all the counters monitored. Also there is no way to detect some issues based on the system configuration.
Read full review
Pros
BeyondTrust
  • Reporting capabilities for user activities, including complete session recordings
  • Integration with SAML for SSO and secure LDAP authentication
  • Jump point servers for central isolated access from outside the network
Read full review
Broadcom
  • Alerting which can be customized by the end user.
  • Visualization of the metrics and data presented to provide a unique and attractive interface.
  • Flexibility to manage actions and commands that we deem important for each application. The ability to define these and customize the metrics reported for each individual application is huge for us.
Read full review
Cons
BeyondTrust
  • Better communication to customers on new release compatibility
  • Crowd-sourced rule logic for specific applications would be nice (I hear underway)
  • Technical support processes could be a bit improved
Read full review
Broadcom
  • We are facing challenges to meet RFP requirements in few areas where I would recommend CA to improve.
  • We are facing challenges for non (java and dotnet application) which CA APM does not support. SAP is another solution where CA APM is not able to address our business requirement.
Read full review
Usability
BeyondTrust
BeyondTrust Endpoint Privilege Management is really usable thanks to the Cloud platform that provide central management, analytics, updates and policy definitions. For policies, quickstart covers around 80% of the overall configuration and we just have to define home made applications and dedicated use cases. From the user perspective, messages can be customized so it's easy to understand for user and they have an endpoint application to follow workflows approval.
Read full review
Broadcom
No answers on this topic
Support Rating
BeyondTrust
The product performed to the level of our requirements.
Read full review
Broadcom
We have never received any support from CA on this product
Read full review
Alternatives Considered
BeyondTrust
BeyondTrust Endpoint Privilege Management has more features than CyberArk and more detailed options for configurations. BeyondTrust Endpoint Privilege Management is more focused on setting up access-related endpoints, which requires some fine tuning and understanding for use cases where a single endpoint has to be shared with multiple vendors. CyberArk's setup is more geared to users' accounts and then endpoint management under the user accounts.
Read full review
Broadcom
We only have 1 application using DX APM, while most of other applications are instrumented using Dynatrace. Dynatrace provides a better monitoring and instrumentation for applications. The required effort to setup monitoring capability using DX APM is way more work compared to Dynatrace, also the amount of KPIs offered from Dynatrace is more than DX APM.
Read full review
Return on Investment
BeyondTrust
  • We are able to securely monitor activity from vendors accessing our network.
  • This meets our cybersecurity objectives of securing our OT networks.
  • The benefits far outweigh the initial cost of the software.
Read full review
Broadcom
  • Introscope is deeply utilized within the organization. However, CEM and Team Center not as much. Those that use one piece don't generally use the others. Partially because of the curve in learning how to use the consoles effectively.
  • reporting is pretty well configured and easy to setup if you know how to use the tools. So this can be easy to use and takes less time to configure for the different groups within the organization.
Read full review
ScreenShots