Likelihood to Recommend BeyondTrust works really well while looking to manage the privileged accounts distributed on various assets utilized in the organization. It is really good at scanning and fetching the asset details, which provides the descriptive details of all possible threat vectors and allowing the administrators to manage and mitigate the risks. Moreover, BeyondTrust's dependency on Flash is a major demerit which awfully affects the functionality and user experience for BeyondInsight.
Read full review I can only think of scenarios where Keeper is well-suited, in my experience. I work in small business (i.e., sole proprietor, 1 employee) environments and Keeper is well-suited to my needs. I imagine it would also be well-suited to multi-user environments, but would require a great deal more management and organization in such environments.
Read full review Pros Privileged Account Management. Vulnerability Management. Session Management. Handling API requests. Identifying and Managing various assets throughout the organization. Read full review Ease of use. User find it simple and intuitive to use and I find they rapidly adjust to the software with minimal training. Single-sign-on. Super important and really makes things simple for the users and easy to manage for us in the IT team. Sharing features. We knew sharing was a key component of our password management solution. Keeper makes it easy for users and simple to administer. Dave Brown Computer and Information Systems Manager
Read full review Cons Dependency on Flash. Securing Files. Managing Service Accounts. Stability of updates. Read full review I find that Keeper could use some work with their desktop interface, a sleeker and friendlier user interface would definitely benefit them. Keeper doesn’t have a Security Dashboard, which makes it more complicated to evaluate the strengths and weaknesses of your passwords. The automatic web form filling is somewhat limited at the time, but im sure they will improve it soon. Read full review Usability It's just easy to use, plain and simple. It has the complexity and user-interface that gives you confidence in its build but the ease-of-use that keep things from getting too complicated. A huge plus when you have to onboard new members of the team or summer interns when you need them to step in and make orders on your behalf.
Read full review Support Rating BeyondTrust Support is available with maximum priority. The user is not required to provide an explanation and is not charged for the case raised. If required, BeyondTrust support is available for every possible requirement, which may differ from a requirement of some document or a hotfix availability. Also, BeyondTrust support takes every request with max priority.
Read full review Because it is so good. It always works, has not crashed even in 3 years; I have a lot of data in it (never any problems).
Read full review Alternatives Considered CyberArk is following the bottom-up approach for the development of the Privileged Access Management solution, which provides a stable and more featured security solution. But everything for CyberArk comes with a cost. Meanwhile, everything for BeyondTrust is included in a single product, and Password safe comes up with vast options under a single utility with cost-effective implementation.
Read full review I have used the Apple cloud, but if you forget your password into that, once again, you’re at the mercy of calling customer service. With Keeper, you can use the thumbprint option to log on, and there’s any of your needed passwords. It’s fast and simple, and you don’t have to wait online to unlock the app you’ve locked yourself out of.
Read full review Return on Investment Positive: Easier User Interface. Positive: Descriptive management of access policies. Negative: Issues in functionality due to random bugs in functioning. Read full review The spreadsheets and printed papers being passed around the office with passwords on them have gone! This is a huge security hole plugged. Users actively use the software which says something - it is easy to use and intuitive. When software is not intuitive, it tends to not get used. It gives IT control over who does what with passwords, and while difficult to quantify it is certainly a dramatically positive impact on the organization. Dave Brown Computer and Information Systems Manager
Read full review ScreenShots