Overview
Product Information on BeyondTrust Privileged Access Management Platform
What is BeyondTrust Privileged Access Management Platform?
BeyondTrust Privileged Access Management Platform Pricing
Overall experience with BeyondTrust Privileged Access Management Platform
“Integration With BT PAM Replaces manual updation in VM tool”
“Experience of Beyond Trust Privilege Access Management Platform”
About Company
Company Description
BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.
Company Details
Do You Manage Peer Insights at BeyondTrust?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About BeyondTrust Privileged Access Management Platform
Reviewer Insights for: BeyondTrust Privileged Access Management Platform
Deciding Factors: BeyondTrust Privileged Access Management Platform Vs. Market Average
Performance of BeyondTrust Privileged Access Management Platform Across Market Features
BeyondTrust Privileged Access Management Platform Likes & Dislikes
Helps get a wholistic view of all the identities across different domains which is essential when managing Identity Exposure through platforms like Crowdstrike IDP but lack this information. Direct dashboard data import feature to help with leadership visibility. Offers good TAC support for integrations.
- Great tool for small and medium set-ups - Cost is also very impressive. - Granular level control and features are really good and make an impact.
Easy to implement, user friendly, connection management
Faced multiple issues while initially trying to create an integration between BT and our VM tool but had the support team help with resolution by changing the latency of connection. A bit on the pricier side compared to the other tools evaluated. The interface takes time to get used to can look cluttered if not organized during implementation. Does sometimes gives us issues for logging in into certain servers but gets back up quickly.
- SSO integration is not very smooth. - Bulk management feature is not up to the mark -
Nothing
Top BeyondTrust Privileged Access Management Platform Alternatives
Peer Discussions
BeyondTrust Privileged Access Management Platform Reviews and Ratings
- Manager, IT Security and Risk Management10B+ USDEnergy and UtilitiesReview Source
Integration With BT PAM Replaces manual updation in VM tool
BeyondTrust PAM in our group had completely replaced local accounts and keys for logins which increases our compliance score across all infra. My team uses BT with our VM tool Tenable for login using APIs without having to manage passwords like earlier and to login to Virtual Machines for troubleshooting. - IT SECURITY & RISK MANAGEMENT ASSOCIATE50M-1B USDConstructionReview Source
Privileged Access Solution Streamlines Vendor and Contractor Site Access Management
This privileged access management application solution is great way to give access to vendors or contractors to sites or plants - IT Security & Risk Management Associate1B-10B USDBankingReview Source
Privileged Management Services Enhance Security but Face Deployment Reliability Issues
I like this product specially to our Company to secure more administering task. - Cyber Security Manager1B-10B USDRetailReview Source
Easy Setup and Scaling Highlighted Despite Concerns Over Potential Security Loopholes
The tool is quite strong and effective tool to improve your security for the your local clients in your company. It allows different level of flexibility for the users but it is not too hard to find a loophole for the restrictions that you implemented. Overall, easy to use and implement. - DIR INFORMATION AND SYSTEMS AND PMO1B-10B USDManufacturingReview Source
Total Privilege Access Control
Meets all of our security requirements to safely manage our end users services.



