BeyondTrust Endpoint Privilege Management, powered by PowerBroker and Avecto Reviews

11 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 8.1 out of 101

Do you work for this company?

Overall Rating

Reviewer's Company Size

Last Updated

By Topic

Industry

Department

Experience

Job Type

Role

Reviews (1-3 of 3)

No photo available
Score 8 out of 10
Vetted Review
Verified User
Review Source
The BeyondTrust Endpoint Privilege management software is being used across my entire project as a tool to prevent malicious software from being installed on our laptop workstations. The business problems it addresses is primarily cybersecurity within our devices that we use in enterprise. Our local technology support team primarily manages this product and it gives us the capability to do our work and install certain programs with elevated status as necessary.
  • security
  • endpoint protection
  • access management
  • design
  • user experience
  • software functionality
BeyondTrust is well suited to do the job in business environments where you need to have something working in the background to ensure users stay protected and malicious programs don't get installed. For scenarios where we've got developer environments, this software interferes more as it doesn't allow certain software and libraries to be installed.
Read this authenticated review
No photo available
Score 10 out of 10
Vetted Review
Verified User
Review Source
It is used as a privileged account management solution in our organization. It is being deployed to all developers and administrators who have access to our servers. It addresses our security concerns as well as potentially keeping the users from abusing privileges.
  • Password management and Secure access to servers
  • Ability to remotely log a session off
  • Administrators having the capability to view the changes made on a specific server through the recording mechanism
  • Integrates well with any servers both on-prem and on cloud
  • Difficult set-up process. Takes numerous iterations of setting up
  • GUI is not user-friendly. Hard to understand the options available and what they do unless you spend a lot of time working on it
  • Might be expensive depending on the licenses you purchase.
It is an absolute must in all organizations where security is taken seriously. For organizations where there is a tendency among the users' end to abuse access privileges, this tool comes in handy. It has features that would enable the administrator to look through video logs to see what was done by a specific user. Also has the capability to terminate or lock users/ user sessions.
Read this authenticated review
No photo available
Score 9 out of 10
Vetted Review
Verified User
Review Source
We have used PBW for several years now and have been overall pleased with the results. Our primary goal to rid users of needing local admin has been solved. Disclaimer: To be fair, we didn't take too much time to first compare with other vendors, but being that I personally had experience with the product, we landed right away on BT.

Only issues we have run into revolve around either crafting specific rules for applications that are tricky to write for. Also,new versions of the product or a new (Microsoft & MAC) OS, you need to be very careful to check for compatibility, as it's a kernel-mode filter driver! Their support have been quite helpful.
  • Solved our primary goal to rid users of needing local admin
  • Their support have been quite helpful
  • Better communication to customers on new release compatibility
  • Crowd-sourced rule logic for specific applications would be nice (I hear underway)
  • Technical support processes could be a bit improved
Goal of removal of local admin rights will be solved. Initial application rule logic a bit tough to get going, but sales engineering team are very helpful with this. Then, ongoing maintenance, other than worrying about new releases, should go smoothly without adding too much on-site support complexity. Best to keep app rule logic as simple as possible.
Read this authenticated review

BeyondTrust Endpoint Privilege Management, powered by PowerBroker and Avecto Scorecard Summary

Feature Scorecard Summary

ID-Management Access Control (1)
8
ID Risk Management (1)
8

About BeyondTrust Endpoint Privilege Management, powered by PowerBroker and Avecto

BeyondTrust Endpoint Privilege Management, powered by PowerBroker and Avecto reduces the risk of privilege abuse by eliminating unnecessary privileges, and can elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity.
Categories:  Identity Management

BeyondTrust Endpoint Privilege Management, powered by PowerBroker and Avecto Technical Details

Operating Systems: Unspecified
Mobile Application:No