TrustRadius: an HG Insights company
BeyondTrust Endpoint Privilege Management Logo

BeyondTrust Endpoint Privilege Management Reviews and Ratings

Rating: 9.9 out of 10
Score
9.9 out of 10

Community insights

TrustRadius Insights for BeyondTrust Endpoint Privilege Management are summaries of user sentiment data from TrustRadius reviews and, when necessary, third party data sources.

Pros

Functionality of Smart Rules and Scripting: Several users have praised the functionality of smart rules and scripting in BeyindTrust, stating that it is very good for managing tasks before, during, and after execution. They appreciate the ability to perform tasks from the script without interfering with or affecting the user.

All Logs in One Place with Rule Creation: Many reviewers have mentioned that having all logs in one place and being able to create rules based on them has been extremely helpful. This feature has aided in identifying and fixing most issues, while also providing control over the applications used by their business.

Effective Radius and SNOW-Automation Features: Users have highlighted the effectiveness of the Radius and SNOW-Automation features in BeyindTrust. These features provide an additional layer of security, ensuring a robust system for managing privileges.

Reviews

7 Reviews

BeyondTrust Endpoint Privilege Management for the win!

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

It allows us to not make users local administrators on their machines while not impacting their ability to install legitimate business use software.

Pros

  • Elevates installs when allowed
  • Allows administrators to elevate non policy items
  • Allows us to not make end users local administrators on their machines

Cons

  • Maybe some minor UI changes

Likelihood to Recommend

If you need something to manage users/installs because of not allowing them to be local administrators, this is the way to go. It's easy to update your policies and push them out and gives you control over what can be installed.

Vetted Review
BeyondTrust Endpoint Privilege Management
5 years of experience

BeyondTrust Endpoint Privilege Management

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

BeyondTrust Endpoint Privilege Management is used to increase user productivity. Indeed, some applications or functions need admin privileges but our users are not local administrator so they had to open a support case each time they need it. Now, these specified applications are dynmically elevated and usable by allowed users and they are able to do their job easily. Moreover, least privilege is now enforced to maintain the higher security level

Pros

  • Allow applications updates without IT need
  • Block dangerous applications
  • Block unknown applications
  • Elevate some windows basic function as installing local printer

Cons

  • Mobile application to approve workflow
  • Quick start Auto update
  • Policy hit information

Likelihood to Recommend

BeyondTrust Endpoint Privilege Management is an easy setup solution thanks to quickstart and we can deploy it on Windows and Mac equaly.

The Cloud deployment is perfect because we don't have anything to manage from the platform and updates are automatically managed with the packager tool. Lastly, analytics allows to have full visibility and map used applications in the company

Vetted Review
BeyondTrust Endpoint Privilege Management
5 years of experience

Tons of features for a PAM solution

Rating: 10 out of 10

Use Cases and Deployment Scope

We needed a solution that would allow secure access to our OT/SCADA/DCS network for both internal users and vendors. We evaluated a few vendors but decided on BeyondTrust since their solution provided a wide variety of features at the optimal price point. We have it deployed globally at all mine sites using distributed environments.

Pros

  • Reporting capabilities for user activities, including complete session recordings
  • Integration with SAML for SSO and secure LDAP authentication
  • Jump point servers for central isolated access from outside the network

Cons

  • There is an extremely steep learning curve.
  • To set this up effectively, you will need their professional services.
  • Web Jump (HTTPS) is not included in the base license. This should have been included by default, as it is a standard remote access method.

Likelihood to Recommend

If you need secure monitoring of access to an OT network, this is the solution for you. It tracks and records everything. This is not recommended for standard remote access VPN for end users, as there is a learning curve. I would only recommend it for access to networks that need to be fully secure.

Vetted Review
BeyondTrust Endpoint Privilege Management
2 years of experience

BeyondTrust Endpoint Privilege Management.

Rating: 8 out of 10

Use Cases and Deployment Scope

BeyondTrust PowerBroker is being used to audit transactions from a very active Oracle Database. BT offers reporting that can be tailored to the target audience.

Pros

  • Detailed reporting.
  • Stable operations.
  • Attentive support.

Cons

  • No recommendation, it has worked well for me.

Likelihood to Recommend

Well suited for delivering detailed auditing data.

Vetted Review
BeyondTrust Endpoint Privilege Management
1 year of experience

BeyondTrust Endpoint Management Software for Software Management

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

The BeyondTrust Endpoint Privilege management software is being used across my entire project as a tool to prevent malicious software from being installed on our laptop workstations. The business problems it addresses is primarily cybersecurity within our devices that we use in enterprise. Our local technology support team primarily manages this product and it gives us the capability to do our work and install certain programs with elevated status as necessary.

Pros

  • security
  • endpoint protection
  • access management

Cons

  • design
  • user experience
  • software functionality

Likelihood to Recommend

BeyondTrust is well suited to do the job in business environments where you need to have something working in the background to ensure users stay protected and malicious programs don't get installed. For scenarios where we've got developer environments, this software interferes more as it doesn't allow certain software and libraries to be installed.

Vetted Review
BeyondTrust Endpoint Privilege Management
1 year of experience

Powerful tool that delivers

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

It is used as a privileged account management solution in our organization. It is being deployed to all developers and administrators who have access to our servers. It addresses our security concerns as well as potentially keeping the users from abusing privileges.

Pros

  • Password management and Secure access to servers
  • Ability to remotely log a session off
  • Administrators having the capability to view the changes made on a specific server through the recording mechanism
  • Integrates well with any servers both on-prem and on cloud

Cons

  • Difficult set-up process. Takes numerous iterations of setting up
  • GUI is not user-friendly. Hard to understand the options available and what they do unless you spend a lot of time working on it
  • Might be expensive depending on the licenses you purchase.

Likelihood to Recommend

It is an absolute must in all organizations where security is taken seriously. For organizations where there is a tendency among the users' end to abuse access privileges, this tool comes in handy. It has features that would enable the administrator to look through video logs to see what was done by a specific user. Also has the capability to terminate or lock users/ user sessions.

Vetted Review
BeyondTrust Endpoint Privilege Management
1 year of experience

Local Admin free, this is the product

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

We have used PBW for several years now and have been overall pleased with the results. Our primary goal to rid users of needing local admin has been solved. Disclaimer: To be fair, we didn't take too much time to first compare with other vendors, but being that I personally had experience with the product, we landed right away on BT.

Only issues we have run into revolve around either crafting specific rules for applications that are tricky to write for. Also,new versions of the product or a new (Microsoft & MAC) OS, you need to be very careful to check for compatibility, as it's a kernel-mode filter driver! Their support have been quite helpful.

Pros

  • Solved our primary goal to rid users of needing local admin
  • Their support have been quite helpful

Cons

  • Better communication to customers on new release compatibility
  • Crowd-sourced rule logic for specific applications would be nice (I hear underway)
  • Technical support processes could be a bit improved

Likelihood to Recommend

Goal of removal of local admin rights will be solved. Initial application rule logic a bit tough to get going, but sales engineering team are very helpful with this. Then, ongoing maintenance, other than worrying about new releases, should go smoothly without adding too much on-site support complexity. Best to keep app rule logic as simple as possible.

Vetted Review
BeyondTrust Endpoint Privilege Management
4 years of experience