Overview
Product Information on Endpoint Privilege Management for Windows and Mac
What is Endpoint Privilege Management for Windows and Mac?
Endpoint Privilege Management for Windows and Mac Pricing
Overall experience with Endpoint Privilege Management for Windows and Mac
“Improving security and reducing workload through a structured approach to permission assignments”
“Good Product - Requires heavy administration”
About Company
Company Description
BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.
Company Details
Do You Manage Peer Insights at BeyondTrust?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About Endpoint Privilege Management for Windows and Mac
Reviewer Insights for: Endpoint Privilege Management for Windows and Mac
Performance of Endpoint Privilege Management for Windows and Mac Across Market Features
Endpoint Privilege Management for Windows and Mac Likes & Dislikes
The admin portal is easy to use and navigate once you are familiar with how the program works. There is criteria built in or added to the applications or processes you approve for admin elevation, which provides a sense of security despite approving those chosen items preemptively. Approving install and update requests from users is now much easier, as users send in a code request, and we reply with their response code.
The opportunities that it affords to end users trying to install common pieces of software on their machine that shouldn't require someone from IT to be able to make that happen.
I really appreciated the level of customization available in application control; as it allows you to define exactly what is required. Privilege management is algo highly customizable. Additionally, the use of Workstyles helps streamline and simplify the implementation process.
There's not really much that I dislike about the software, but more so complications that we've encountered. Deployment has been challenging at times. Once we've installed the required software on the target computer, there are times it won't automatically update, connect back to the console, or will still prompt for local admin permissions rather than the code method for certain processes. I personally don't believe these are issues with the product itself, but rather missing pieces within our current deployment. Their support team has been great in assisting with issues as they arise, and we're still waiting to investigate most of the problems we've encountered until we can finish more of the overall deployment within the organization. I guess to summarize, the potential for complications is there, but their support is a great resource.
It seems like sometimes it takes a while to resolutions to some of the issues we have had to reach out to support for assistance with. That and the inconsistencies on the mac side (different macOS versions can result in different experiences - not necessarily the fault of this product.
The layout of the messages for the users has a slightly outdated design, but it does not influence the functiolnality. I would like the manual / instructions to be more detailed, with examples. It's a bit of a complex update as there are many modules in BeyondInshgt.
Top Endpoint Privilege Management for Windows and Mac Alternatives
Peer Discussions
Endpoint Privilege Management for Windows and Mac Reviews and Ratings
- IT ASSOCIATE50M-1B USDManufacturingReview Source
Improving security and reducing workload through a structured approach to permission assignments
This product has excelled in helping us fix security vulnerabilities with how we handled local admin permissions for tasks such as installing and updating applications, and reducing our overall ticketing volume. Rather than having admin permissions/access assigned locally based on user role within the organization, we were able to overhaul the previous structure and manage admin permissions based on specific applications and processes. The setup within the admin console was easy to manage. We linked our databases, which made is easy to integrate groups and users for permission assignment, and separation of role based applications vs. business based apps for all users. We're still in the process of deploying the software to all units in our fleet, but the experience so far has been great. - TECHNOLOGY SERVICE DESK SPECIALISTGov't/PS/EdEducationReview Source
Good Product - Requires heavy administration
We have had our ups and downs with Beyond Trust Endpoint Privileged Management. I believe the issues that we have run into is due to the tact that to effectively manage this software in a larger environment you really need a full time person who's job is managing it. - IT SECURITY50M-1B USDServices (non-Government)Review Source
BeyondTrust EPM - Privilege and Application Control - Robust, reliable and stable.
So far, my experience has been positive and engaging; as we are at the early stages of the implementation. Our team is carryng out the deployment independently, without the need for external assistance. Ensuring that users have only the minimum privileges necessary is a fundamental requeriment. The application is robust, reliable and stable. - MANAGER, IT SECURITY AND RISK MANAGEMENT<50M USDIT ServicesReview Source
Versatility Increases Across Endpoints and Servers With Noticeable Product Evolution
The constant evolution has been noticeable since the days of PowerBroker for Windows. There has been a significant leap after the migration to SaaS, and the auto-update feature is commendable - SYSTEM ADMINISTRATOR<50M USDSoftwareReview Source
EPM is a must for any business that is serious about endpoint security.
BeyondTrust EPM was easy to implement. The training we received was personalized and friendly. They even managed to make it fun to implement.



