BeyondTrust Endpoint Privilege Management Reviews and Ratings
Rating: 9.9 out of 10
Score
9.9 out of 10
Community insights
TrustRadius Insights for BeyondTrust Endpoint Privilege Management are summaries of user sentiment data from TrustRadius reviews and, when necessary, third party data sources.
Pros
Functionality of Smart Rules and Scripting: Several users have praised the functionality of smart rules and scripting in BeyindTrust, stating that it is very good for managing tasks before, during, and after execution. They appreciate the ability to perform tasks from the script without interfering with or affecting the user.
All Logs in One Place with Rule Creation: Many reviewers have mentioned that having all logs in one place and being able to create rules based on them has been extremely helpful. This feature has aided in identifying and fixing most issues, while also providing control over the applications used by their business.
Effective Radius and SNOW-Automation Features: Users have highlighted the effectiveness of the Radius and SNOW-Automation features in BeyindTrust. These features provide an additional layer of security, ensuring a robust system for managing privileges.
It allows us to not make users local administrators on their machines while not impacting their ability to install legitimate business use software.
Pros
Elevates installs when allowed
Allows administrators to elevate non policy items
Allows us to not make end users local administrators on their machines
Cons
Maybe some minor UI changes
Likelihood to Recommend
If you need something to manage users/installs because of not allowing them to be local administrators, this is the way to go. It's easy to update your policies and push them out and gives you control over what can be installed.
VU
Verified User
Administrator in Information Technology (501-1000 employees)
BeyondTrust Endpoint Privilege Management is used to increase user productivity. Indeed, some applications or functions need admin privileges but our users are not local administrator so they had to open a support case each time they need it. Now, these specified applications are dynmically elevated and usable by allowed users and they are able to do their job easily. Moreover, least privilege is now enforced to maintain the higher security level
Pros
Allow applications updates without IT need
Block dangerous applications
Block unknown applications
Elevate some windows basic function as installing local printer
Cons
Mobile application to approve workflow
Quick start Auto update
Policy hit information
Likelihood to Recommend
BeyondTrust Endpoint Privilege Management is an easy setup solution thanks to quickstart and we can deploy it on Windows and Mac equaly.
The Cloud deployment is perfect because we don't have anything to manage from the platform and updates are automatically managed with the packager tool. Lastly, analytics allows to have full visibility and map used applications in the company
VU
Verified User
Engineer in Information Technology (51-200 employees)
We needed a solution that would allow secure access to our OT/SCADA/DCS network for both internal users and vendors. We evaluated a few vendors but decided on BeyondTrust since their solution provided a wide variety of features at the optimal price point. We have it deployed globally at all mine sites using distributed environments.
Pros
Reporting capabilities for user activities, including complete session recordings
Integration with SAML for SSO and secure LDAP authentication
Jump point servers for central isolated access from outside the network
Cons
There is an extremely steep learning curve.
To set this up effectively, you will need their professional services.
Web Jump (HTTPS) is not included in the base license. This should have been included by default, as it is a standard remote access method.
Likelihood to Recommend
If you need secure monitoring of access to an OT network, this is the solution for you. It tracks and records everything. This is not recommended for standard remote access VPN for end users, as there is a learning curve. I would only recommend it for access to networks that need to be fully secure.
VU
Verified User
Professional in Information Technology (5001-10,000 employees)
BeyondTrust PowerBroker is being used to audit transactions from a very active Oracle Database. BT offers reporting that can be tailored to the target audience.
Pros
Detailed reporting.
Stable operations.
Attentive support.
Cons
No recommendation, it has worked well for me.
Likelihood to Recommend
Well suited for delivering detailed auditing data.
VU
Verified User
Employee in Information Technology (10,001+ employees)
The BeyondTrust Endpoint Privilege management software is being used across my entire project as a tool to prevent malicious software from being installed on our laptop workstations. The business problems it addresses is primarily cybersecurity within our devices that we use in enterprise. Our local technology support team primarily manages this product and it gives us the capability to do our work and install certain programs with elevated status as necessary.
Pros
security
endpoint protection
access management
Cons
design
user experience
software functionality
Likelihood to Recommend
BeyondTrust is well suited to do the job in business environments where you need to have something working in the background to ensure users stay protected and malicious programs don't get installed. For scenarios where we've got developer environments, this software interferes more as it doesn't allow certain software and libraries to be installed.
It is used as a privileged account management solution in our organization. It is being deployed to all developers and administrators who have access to our servers. It addresses our security concerns as well as potentially keeping the users from abusing privileges.
Pros
Password management and Secure access to servers
Ability to remotely log a session off
Administrators having the capability to view the changes made on a specific server through the recording mechanism
Integrates well with any servers both on-prem and on cloud
Cons
Difficult set-up process. Takes numerous iterations of setting up
GUI is not user-friendly. Hard to understand the options available and what they do unless you spend a lot of time working on it
Might be expensive depending on the licenses you purchase.
Likelihood to Recommend
It is an absolute must in all organizations where security is taken seriously. For organizations where there is a tendency among the users' end to abuse access privileges, this tool comes in handy. It has features that would enable the administrator to look through video logs to see what was done by a specific user. Also has the capability to terminate or lock users/ user sessions.
VU
Verified User
Engineer in Information Technology (501-1000 employees)
We have used PBW for several years now and have been overall pleased with the results. Our primary goal to rid users of needing local admin has been solved. Disclaimer: To be fair, we didn't take too much time to first compare with other vendors, but being that I personally had experience with the product, we landed right away on BT.
Only issues we have run into revolve around either crafting specific rules for applications that are tricky to write for. Also,new versions of the product or a new (Microsoft & MAC) OS, you need to be very careful to check for compatibility, as it's a kernel-mode filter driver! Their support have been quite helpful.
Pros
Solved our primary goal to rid users of needing local admin
Their support have been quite helpful
Cons
Better communication to customers on new release compatibility
Crowd-sourced rule logic for specific applications would be nice (I hear underway)
Technical support processes could be a bit improved
Likelihood to Recommend
Goal of removal of local admin rights will be solved. Initial application rule logic a bit tough to get going, but sales engineering team are very helpful with this. Then, ongoing maintenance, other than worrying about new releases, should go smoothly without adding too much on-site support complexity. Best to keep app rule logic as simple as possible.
VU
Verified User
Engineer in Information Technology (1001-5000 employees)