TrustRadius: an HG Insights company

BeyondTrust Endpoint Privilege Management

Score9.8 out of 10

26 Reviews and Ratings

What is BeyondTrust Endpoint Privilege Management?

BeyondTrust Endpoint Privilege Management, powered by PowerBroker and Avecto reduces the risk of privilege abuse by eliminating unnecessary privileges, and can elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity.

BeyondTrust Endpoint Privilege Management for the win!

Use Cases and Deployment Scope

It allows us to not make users local administrators on their machines while not impacting their ability to install legitimate business use software.

Pros

  • Elevates installs when allowed
  • Allows administrators to elevate non policy items
  • Allows us to not make end users local administrators on their machines

Cons

  • Maybe some minor UI changes

Return on Investment

  • Adds another layer to our security model
  • Makes cyber insurance happy

Usability

Alternatives Considered

CyberArk Privileged Access Management

Other Software Used

BeyondTrust Privileged Remote Access, BeyondTrust Remote Support, PDQ Deploy & Inventory

BeyondTrust Endpoint Privilege Management

Use Cases and Deployment Scope

BeyondTrust Endpoint Privilege Management is used to increase user productivity. Indeed, some applications or functions need admin privileges but our users are not local administrator so they had to open a support case each time they need it. Now, these specified applications are dynmically elevated and usable by allowed users and they are able to do their job easily. Moreover, least privilege is now enforced to maintain the higher security level

Pros

  • Allow applications updates without IT need
  • Block dangerous applications
  • Block unknown applications
  • Elevate some windows basic function as installing local printer

Cons

  • Mobile application to approve workflow
  • Quick start Auto update
  • Policy hit information

Return on Investment

  • Users are more autonomous
  • Applications are up to date easily
  • Previously locked actions could be delivered to users

Usability

Other Software Used

BeyondTrust Remote Support

Tons of features for a PAM solution

Use Cases and Deployment Scope

We needed a solution that would allow secure access to our OT/SCADA/DCS network for both internal users and vendors. We evaluated a few vendors but decided on BeyondTrust since their solution provided a wide variety of features at the optimal price point. We have it deployed globally at all mine sites using distributed environments.

Pros

  • Reporting capabilities for user activities, including complete session recordings
  • Integration with SAML for SSO and secure LDAP authentication
  • Jump point servers for central isolated access from outside the network

Cons

  • There is an extremely steep learning curve.
  • To set this up effectively, you will need their professional services.
  • Web Jump (HTTPS) is not included in the base license. This should have been included by default, as it is a standard remote access method.

Most Important Features

  • RDP, SSH, and Web Jump
  • Session recordings
  • Approval for starting sessions

Return on Investment

  • We are able to securely monitor activity from vendors accessing our network.
  • This meets our cybersecurity objectives of securing our OT networks.
  • The benefits far outweigh the initial cost of the software.

Alternatives Considered

CyberArk Privileged Account Security

BeyondTrust Endpoint Privilege Management.

Pros

  • Detailed reporting.
  • Stable operations.
  • Attentive support.

Cons

  • No recommendation, it has worked well for me.

Return on Investment

  • Auditing reports has allowed us to meet various requirements better.

BeyondTrust Endpoint Management Software for Software Management

Pros

  • security
  • endpoint protection
  • access management

Cons

  • design
  • user experience
  • software functionality

Return on Investment

  • security
  • access control
  • IT management

Other Software Used

Forcepoint Web Security