Likelihood to Recommend BeyondTrust works really well while looking to manage the privileged accounts distributed on various assets utilized in the organization. It is really good at scanning and fetching the asset details, which provides the descriptive details of all possible threat vectors and allowing the administrators to manage and mitigate the risks. Moreover, BeyondTrust's dependency on Flash is a major demerit which awfully affects the functionality and user experience for BeyondInsight.
Read full review We are happy with the management of the Id, accounts where the user can request any access easily. Also the many connector which Sailpoint is offering in order to onboard lots of applications is quite helpful. The access review module has also have been improve so that large campaigns can we work out easily. Where we see some improvement is on the UI as here it is not so intuitive for the end user, so that we need to make lots of communications and training so that the user is able to understand how to use it. For the administration and creation of roles it also would be great to have some improvements here to make it more easily its management.
Read full review Pros Privileged Account Management. Vulnerability Management. Session Management. Handling API requests. Identifying and Managing various assets throughout the organization. Read full review Brings users access, profiles and accounts all into one place Manages the Life Cycle Management process across ALL identities, permanent and Temporary Secures and manages access to critical applications and resources across the group Enables Info. Security to customise, share and delegate authority across the group Single version of the truth across our technology platform Read full review Cons Dependency on Flash. Securing Files. Managing Service Accounts. Stability of updates. Read full review The user interface is not very intuitive. It is hard for the occasional user to navigate through the request process. There are no instructions on the screen to help the user to know what to do. It is left up to the user to figure out what to click on and how to navigate through the process. Read full review Usability Overall usablity is excellent. The product is capable of performing all the expected tasks for a IAM solution.
Read full review Support Rating BeyondTrust Support is available with maximum priority. The user is not required to provide an explanation and is not charged for the case raised. If required, BeyondTrust support is available for every possible requirement, which may differ from a requirement of some document or a hotfix availability. Also, BeyondTrust support takes every request with max priority.
Read full review Support for Customizations is very limited.
Read full review Implementation Rating Implementation was done correctly and all the requirements were met.
Read full review Alternatives Considered CyberArk is following the bottom-up approach for the development of the Privileged Access Management solution, which provides a stable and more featured security solution. But everything for CyberArk comes with a cost. Meanwhile, everything for BeyondTrust is included in a single product, and Password safe comes up with vast options under a single utility with cost-effective implementation.
Read full review The on-prem SailPoint IdentityIQ platform provides the necessary customization that is required in our dynamic environment. Although we may look at a cloud-based Identity Management service again in the future, (there are many advantages), our identity management, authentication, and application assignment processes cannot be quickly consolidated to a single cloud-based service at this time.
Read full review Return on Investment Positive: Easier User Interface. Positive: Descriptive management of access policies. Negative: Issues in functionality due to random bugs in functioning. Read full review Over 300,000 password change/reset calls avoided to the helpdesk annually. 1,000 plus accounts with proper accesses provisioned via automated birthright processes weekly versus 1-2 days of manual provisioning and approvals. With a call center population that churns many people per week, this brings many dollars of efficiency to the operations teams. Flexibility on terminations to manage accounts and access for target applications based on regulatory or business rules to ensure compliance and avoid fines for non-compliance. Read full review ScreenShots