BeyondTrust Endpoint Privilege Management vs. Lookout

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
BeyondTrust Endpoint Privilege Management
Score 10.0 out of 10
N/A
BeyondTrust Endpoint Privilege Management, powered by PowerBroker and Avecto reduces the risk of privilege abuse by eliminating unnecessary privileges, and can elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity.N/A
Lookout
Score 9.0 out of 10
N/A
Lookout, from the San Francisco-based company of the same name, is a platform offering mobile endpoint security.
$2.99
Per Device Per Month
Pricing
BeyondTrust Endpoint Privilege ManagementLookout
Editions & Modules
No answers on this topic
Premium
$2.99
Per Device Per Month
Offerings
Pricing Offerings
BeyondTrust Endpoint Privilege ManagementLookout
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
BeyondTrust Endpoint Privilege ManagementLookout
Best Alternatives
BeyondTrust Endpoint Privilege ManagementLookout
Small Businesses

No answers on this topic

No answers on this topic

Medium-sized Companies
ManageEngine ADManager Plus
ManageEngine ADManager Plus
Score 9.3 out of 10
Sophos Mobile
Sophos Mobile
Score 8.3 out of 10
Enterprises
ManageEngine ADManager Plus
ManageEngine ADManager Plus
Score 9.3 out of 10

No answers on this topic

All AlternativesView all alternativesView all alternatives
User Ratings
BeyondTrust Endpoint Privilege ManagementLookout
Likelihood to Recommend
10.0
(7 ratings)
9.0
(6 ratings)
Likelihood to Renew
10.0
(1 ratings)
-
(0 ratings)
Usability
9.5
(2 ratings)
10.0
(1 ratings)
Availability
10.0
(1 ratings)
-
(0 ratings)
Performance
10.0
(1 ratings)
-
(0 ratings)
Support Rating
10.0
(2 ratings)
-
(0 ratings)
In-Person Training
10.0
(1 ratings)
-
(0 ratings)
Online Training
10.0
(1 ratings)
-
(0 ratings)
Implementation Rating
10.0
(1 ratings)
-
(0 ratings)
Configurability
10.0
(1 ratings)
-
(0 ratings)
Contract Terms and Pricing Model
10.0
(1 ratings)
-
(0 ratings)
Product Scalability
10.0
(1 ratings)
-
(0 ratings)
Professional Services
10.0
(1 ratings)
-
(0 ratings)
Vendor post-sale
10.0
(1 ratings)
-
(0 ratings)
Vendor pre-sale
10.0
(1 ratings)
-
(0 ratings)
User Testimonials
BeyondTrust Endpoint Privilege ManagementLookout
Likelihood to Recommend
BeyondTrust
It is an absolute must in all organizations where security is taken seriously. For organizations where there is a tendency among the users' end to abuse access privileges, this tool comes in handy. It has features that would enable the administrator to look through video logs to see what was done by a specific user. Also has the capability to terminate or lock users/ user sessions.
Read full review
Lookout
Lookout is excellent for mobile device security. I'd recommend it to anyone looking for a simple solution to guarantee peace of mind when keeping mobile devices secure. It's also excellent for finding a device that's been lost remotely, including an excellent feature for enabling audio on a device when it was put in silent mode locally. The web UI is easy to use and allows for powerful functionality through a simple interface. Lastly, it is an excellent secondary backup solution. I'd recommend having other potential backup solutions as well in case this premium feature ever expires and you aren't sure whether you have a most recent contact backup within Lookout.
Read full review
Pros
BeyondTrust
  • Reporting capabilities for user activities, including complete session recordings
  • Integration with SAML for SSO and secure LDAP authentication
  • Jump point servers for central isolated access from outside the network
Read full review
Lookout
  • It emits alerts before any vulnerability found, thus avoiding damages.
  • It has a very simple interface so it is easy to use.
  • It allows the protection against vulnerabilities as well as the backup of information and search before the loss of the mobile or theft.
  • It runs in the background so it does not interrupt any activity.
  • Its access is very flexible since only the internet is required to access through the application or web.
Read full review
Cons
BeyondTrust
  • Better communication to customers on new release compatibility
  • Crowd-sourced rule logic for specific applications would be nice (I hear underway)
  • Technical support processes could be a bit improved
Read full review
Lookout
  • They're the global, mobile cyber experts we trust. They're ahead of the curve already. All I could suggest is, keep going in that direction.
  • Perhaps, send out an occasional , brief update on global trends that business executives should be aware of, even when Lookout is already on it.
  • Keep it brief, with a case study where a proactive action was taken and an event was avoided. Those would be shared enterprise-wide.
  • More PR about your proactive actions would be educational for us all. NO FUD, will ever work, but seeing that there are actions we can take, even to the newest of threats will be very effective.
Read full review
Usability
BeyondTrust
BeyondTrust Endpoint Privilege Management is really usable thanks to the Cloud platform that provide central management, analytics, updates and policy definitions. For policies, quickstart covers around 80% of the overall configuration and we just have to define home made applications and dedicated use cases. From the user perspective, messages can be customized so it's easy to understand for user and they have an endpoint application to follow workflows approval.
Read full review
Lookout
I have never had any issue using the application since the UI and settings are laid out in an easy to follow way.
Read full review
Reliability and Availability
BeyondTrust
We've had no availability issues.
Read full review
Lookout
No answers on this topic
Performance
BeyondTrust
We've had no performance issues.
Read full review
Lookout
No answers on this topic
Support Rating
BeyondTrust
The product performed to the level of our requirements.
Read full review
Lookout
No answers on this topic
In-Person Training
BeyondTrust
The in person training was great. Very informative and the trainer was great. I would highly recommend this option if you're hesitant. Any questions can then be directed to support. Support is great as well, and will definitely help answer any questions. I would definitely
recommend adding some type of training as it was very helpful for our
staff.
Read full review
Lookout
No answers on this topic
Online Training
BeyondTrust
It was informative and very helpful. They provide a lot of courses that give you exactly what is needed to manage the product. Any questions can then be directed to support. I would definitely recommend adding some type of training as it was very helpful for our staff. The online training sufficed for us.
Read full review
Lookout
No answers on this topic
Implementation Rating
BeyondTrust
BeyondTrust was super helpful with implementation and it only took a few weeks to get it up and running.
Read full review
Lookout
No answers on this topic
Alternatives Considered
BeyondTrust
BeyondTrust Endpoint Privilege Management has more features than CyberArk and more detailed options for configurations. BeyondTrust Endpoint Privilege Management is more focused on setting up access-related endpoints, which requires some fine tuning and understanding for use cases where a single endpoint has to be shared with multiple vendors. CyberArk's setup is more geared to users' accounts and then endpoint management under the user accounts.
Read full review
Lookout
Lookout was chosen by T-Mobile, Sprint, and AT&T which many employees have chosen as their mobile network provider. From that standpoint, it made it a simple decision. Its cloud based technology gives insight across almost all mobile code in the world. Lookout identifies connections that would otherwise go unseen without deep investigation. It helps prevent cybercriminals from sneaking into mobile devices and that's the key component for any mobile security solution. MobileIron and other competitor solutions have a similar offering, but based on network provider support I haven't need to look into the competition extensively.
Read full review
Scalability
BeyondTrust
It's very easy to deploy with minimal interruption.
Read full review
Lookout
No answers on this topic
Professional Services
BeyondTrust
The integration team was great.
Read full review
Lookout
No answers on this topic
Return on Investment
BeyondTrust
  • We are able to securely monitor activity from vendors accessing our network.
  • This meets our cybersecurity objectives of securing our OT networks.
  • The benefits far outweigh the initial cost of the software.
Read full review
Lookout
  • Security is often hard to translate into ROI terms. However, having an option to locate a device does mitigate a possible large expense in fines or other issues with loss of data.
  • Minimal cost/support needs, does not significantly impact support staff. So can add support without additional costs.
Read full review
ScreenShots