BeyondTrust Endpoint Privilege Management Reviews

14 Ratings
<a href='' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 7.9 out of 100

Do you work for this company? Manage this listing

Overall Rating

Reviewer's Company Size

Last Updated

By Topic




Job Type


Reviews (1-4 of 4)

Anonymous | TrustRadius Reviewer
December 09, 2019

BeyondTrust Endpoint Privilege Management.

Score 8 out of 10
Vetted Review
Verified User
Review Source
BeyondTrust PowerBroker is being used to audit transactions from a very active Oracle Database. BT offers reporting that can be tailored to the target audience.
  • Detailed reporting.
  • Stable operations.
  • Attentive support.
  • No recommendation, it has worked well for me.
Well suited for delivering detailed auditing data.
Read this authenticated review
Anonymous | TrustRadius Reviewer
July 11, 2019

BeyondTrust Endpoint Management Software for Software Management

Score 8 out of 10
Vetted Review
Verified User
Review Source
The BeyondTrust Endpoint Privilege management software is being used across my entire project as a tool to prevent malicious software from being installed on our laptop workstations. The business problems it addresses is primarily cybersecurity within our devices that we use in enterprise. Our local technology support team primarily manages this product and it gives us the capability to do our work and install certain programs with elevated status as necessary.
  • security
  • endpoint protection
  • access management
  • design
  • user experience
  • software functionality
BeyondTrust is well suited to do the job in business environments where you need to have something working in the background to ensure users stay protected and malicious programs don't get installed. For scenarios where we've got developer environments, this software interferes more as it doesn't allow certain software and libraries to be installed.
Read this authenticated review
Anonymous | TrustRadius Reviewer
January 15, 2018

Powerful tool that delivers

Score 10 out of 10
Vetted Review
Verified User
Review Source
It is used as a privileged account management solution in our organization. It is being deployed to all developers and administrators who have access to our servers. It addresses our security concerns as well as potentially keeping the users from abusing privileges.
  • Password management and Secure access to servers
  • Ability to remotely log a session off
  • Administrators having the capability to view the changes made on a specific server through the recording mechanism
  • Integrates well with any servers both on-prem and on cloud
  • Difficult set-up process. Takes numerous iterations of setting up
  • GUI is not user-friendly. Hard to understand the options available and what they do unless you spend a lot of time working on it
  • Might be expensive depending on the licenses you purchase.
It is an absolute must in all organizations where security is taken seriously. For organizations where there is a tendency among the users' end to abuse access privileges, this tool comes in handy. It has features that would enable the administrator to look through video logs to see what was done by a specific user. Also has the capability to terminate or lock users/ user sessions.
Read this authenticated review
Anonymous | TrustRadius Reviewer
June 22, 2017

Local Admin free, this is the product

Score 9 out of 10
Vetted Review
Verified User
Review Source
We have used PBW for several years now and have been overall pleased with the results. Our primary goal to rid users of needing local admin has been solved. Disclaimer: To be fair, we didn't take too much time to first compare with other vendors, but being that I personally had experience with the product, we landed right away on BT.

Only issues we have run into revolve around either crafting specific rules for applications that are tricky to write for. Also,new versions of the product or a new (Microsoft & MAC) OS, you need to be very careful to check for compatibility, as it's a kernel-mode filter driver! Their support have been quite helpful.
  • Solved our primary goal to rid users of needing local admin
  • Their support have been quite helpful
  • Better communication to customers on new release compatibility
  • Crowd-sourced rule logic for specific applications would be nice (I hear underway)
  • Technical support processes could be a bit improved
Goal of removal of local admin rights will be solved. Initial application rule logic a bit tough to get going, but sales engineering team are very helpful with this. Then, ongoing maintenance, other than worrying about new releases, should go smoothly without adding too much on-site support complexity. Best to keep app rule logic as simple as possible.
Read this authenticated review

BeyondTrust Endpoint Privilege Management Scorecard Summary

Feature Scorecard Summary

ID-Management Access Control (2)
ID Risk Management (2)

About BeyondTrust Endpoint Privilege Management

BeyondTrust Endpoint Privilege Management suite enables users to eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity.
Categories:  Identity Management

BeyondTrust Endpoint Privilege Management Competitors

CyberArk, Centrify, One Identity, Thycotic

BeyondTrust Endpoint Privilege Management Technical Details

Operating Systems: Unspecified
Mobile Application:No