Introducing G2.ai, the future of software buying.Try now

Compare Akeyless Identity Security Platform and BeyondTrust Endpoint Privilege Management

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Star Rating
(82)4.6 out of 5
Market Segments
Enterprise (49.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Akeyless Identity Security Platform
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Star Rating
(23)4.1 out of 5
Market Segments
Enterprise (54.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about BeyondTrust Endpoint Privilege Management
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that BeyondTrust Endpoint Privilege Management excels in "Multi-Factor Authentication" with a score of 9.8, which reviewers mention enhances security significantly, while Akeyless Platform also performs well in this area with a score of 9.5, but some users feel it could offer more intuitive setup options.
  • Reviewers mention that Akeyless Platform shines in "Centralized Management" with a score of 9.4, making it easier for administrators to manage access and permissions, whereas BeyondTrust's score of 9.0 is solid but lacks some of the advanced features that users desire.
  • G2 users highlight the "Ease of Use" for Akeyless Platform, scoring 9.0, which many find user-friendly and straightforward, while BeyondTrust's score of 8.1 indicates that some users face a steeper learning curve, particularly in initial setup.
  • Users on G2 report that BeyondTrust's "Quality of Support" is rated at 8.5, with many reviewers appreciating the responsiveness of the support team, while Akeyless Platform outperforms with a score of 9.3, indicating a more robust support experience according to user feedback.
  • Reviewers mention that Akeyless Platform's "Audit and Enforcement" features are highly rated, contributing to a score of 9.0, which users find essential for compliance, while BeyondTrust's score of 7.6 suggests that its auditing capabilities may not meet all user expectations.
  • Users say that BeyondTrust's "Approval Workflows" score of 7.9 indicates room for improvement, as some find the process cumbersome, whereas Akeyless Platform's automated provisioning and approval workflows are praised for their efficiency, contributing to a smoother user experience.
Pricing
Entry-Level Pricing
Akeyless Identity Security Platform
No pricing available
BeyondTrust Endpoint Privilege Management
No pricing available
Free Trial
Akeyless Identity Security Platform
Free Trial is available
BeyondTrust Endpoint Privilege Management
No trial information available
Ratings
Meets Requirements
8.9
61
9.2
18
Ease of Use
9.0
60
8.4
18
Ease of Setup
8.2
49
7.3
15
Ease of Admin
8.7
42
8.5
12
Quality of Support
9.2
55
8.6
17
Has the product been a good partner in doing business?
9.7
41
9.1
11
Product Direction (% positive)
9.6
55
10.0
17
Features by Category
Encryption Key ManagementHide 10 FeaturesShow 10 Features
9.1
24
Not enough data
Functionality
9.2
22
Not enough data
9.2
17
Not enough data
9.2
20
Not enough data
Availability
8.8
20
Not enough data
9.2
19
Not enough data
9.4
18
Not enough data
9.4
21
Not enough data
Administration
8.8
19
Not enough data
9.4
18
Not enough data
9.0
20
Not enough data
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
8.9
18
8.3
12
Administration
8.9
18
9.1
11
8.5
10
8.3
11
9.0
16
7.6
11
8.4
15
7.3
11
9.2
16
8.2
11
9.2
14
8.3
11
Functionality
9.9
13
8.9
12
9.8
16
8.9
11
9.8
11
7.2
10
9.2
14
7.5
10
9.4
15
7.7
11
9.3
17
8.6
11
8.6
12
8.2
11
9.3
9
Feature Not Available
9.4
16
7.3
10
9.2
15
7.9
11
Monitoring
8.6
15
8.9
11
8.4
16
8.8
11
8.8
10
Feature Not Available
Reporting
8.2
17
9.1
11
8.3
15
9.2
11
Certificate Lifecycle Management (CLM)Hide 9 FeaturesShow 9 Features
9.9
9
Not enough data
Functionality
10.0
5
Not enough data
10.0
5
Not enough data
10.0
5
Not enough data
9.7
6
Not enough data
10.0
6
Not enough data
10.0
6
Not enough data
10.0
6
Not enough data
9.3
5
Not enough data
10.0
6
Not enough data
Secrets Management ToolsHide 3 FeaturesShow 3 Features
8.2
30
Not enough data
Functionality
7.5
26
Not enough data
8.5
26
Not enough data
8.5
25
Not enough data
Non-Human Identity Management (NHIM) SolutionsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Lifecycle & Provisioning - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access, Authentication & Authorization - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility, Governance & Compliance - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.6
29
Not enough data
Usability & Access
9.3
28
Not enough data
8.1
25
Not enough data
7.3
18
Not enough data
8.6
22
Not enough data
8.8
26
Not enough data
Security Measures
9.0
22
Not enough data
9.3
23
Not enough data
Feature Not Available
Not enough data
Storage
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Akeyless Identity Security Platform
Akeyless Identity Security Platform
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Akeyless Identity Security Platform and BeyondTrust Endpoint Privilege Management are categorized as Privileged Access Management (PAM)
Unique Categories
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management has no unique categories
Reviews
Reviewers' Company Size
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Small-Business(50 or fewer emp.)
20.8%
Mid-Market(51-1000 emp.)
29.9%
Enterprise(> 1000 emp.)
49.4%
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Small-Business(50 or fewer emp.)
0%
Mid-Market(51-1000 emp.)
45.5%
Enterprise(> 1000 emp.)
54.5%
Reviewers' Industry
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Information Technology and Services
15.4%
Computer Software
12.8%
Marketing and Advertising
10.3%
Insurance
9.0%
Financial Services
9.0%
Other
43.6%
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Information Technology and Services
13.6%
Hospital & Health Care
9.1%
Computer Software
9.1%
Banking
9.1%
Manufacturing
4.5%
Other
54.5%
Alternatives
Akeyless Identity Security Platform
Akeyless Identity Security Platform Alternatives
HashiCorp Vault
HashiCorp Vault
Add HashiCorp Vault
1Password
1Password
Add 1Password
Egnyte
Egnyte
Add Egnyte
Keeper Password Manager
Keeper Password Manager
Add Keeper Password Manager
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management Alternatives
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Delinea Secret Server
Delinea Secret Server
Add Delinea Secret Server
JumpCloud
JumpCloud
Add JumpCloud
Salesforce Platform
Salesforce Platform
Add Salesforce Platform
Discussions
Akeyless Identity Security Platform
Akeyless Identity Security Platform Discussions
Monty the Mongoose crying
Akeyless Identity Security Platform has no discussions with answers
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management Discussions
Monty the Mongoose crying
BeyondTrust Endpoint Privilege Management has no discussions with answers