Introducing G2.ai, the future of software buying.Try now

BeyondTrust Endpoint Privilege Management Reviews & Product Details

Value at a Glance

Averages based on real user reviews.

Perceived Cost

$$$$$

BeyondTrust Endpoint Privilege Management Integrations

(3)
Verified by BeyondTrust Endpoint Privilege Management
Product Avatar Image

Have you used BeyondTrust Endpoint Privilege Management before?

Answer a few questions to help the BeyondTrust Endpoint Privilege Management community

BeyondTrust Endpoint Privilege Management Reviews (22)

Reviews

BeyondTrust Endpoint Privilege Management Reviews (22)

4.0
23 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
JAYANTH B.
JB
Support Engineer
Information Technology and Services
Enterprise (> 1000 emp.)
"Exceptional Control and Seamless Admin Rights Management"
What do you like best about BeyondTrust Endpoint Privilege Management?

This product offers excellent granular control over local admin rights and application allow listing. It removes admin rights smoothly, ensuring users remain productive, and provides robust auditing along with straightforward policy management. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Endpoint Privilege Management?

The process of creating and fine-tuning policies at the beginning can take quite a bit of time, and I find that the reporting interface occasionally feels awkward and sluggish, especially when compared to the smoother experience in other parts of the console. Review collected by and hosted on G2.com.

AC
Security Analyst
Enterprise (> 1000 emp.)
"Comprehensive Privilege Control with Fast, Flexible Configuration"
What do you like best about BeyondTrust Endpoint Privilege Management?

I appreciate that, beyond just application control, it also handles privilege elevation with a variety of configuration options. Changes are implemented swiftly. It provides detailed control over what actions a user can perform and which privileges can be elevated on the machine, making it much more than a basic program controller.

After deployment it is easy to use. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Endpoint Privilege Management?

I found the initial implementation to be somewhat challenging, but once everything is set up, ongoing maintenance is straightforward.

I don't find the BeyondInsight console easy to manage, in some cases I prefer the Windows management console snap-in. Review collected by and hosted on G2.com.

"Effortless Setup, Powerful Endpoint Management"
What do you like best about BeyondTrust Endpoint Privilege Management?

I find BeyondTrust Endpoint Privilege Management to be impressively simple to use, which is a major benefit. The ease of setup and configuration makes it very accessible, not only for me but also for my customers. This simplicity reduces the effort required for maintenance and ensures a maintainable solution is achievable, which is highly valued by my clients. I also appreciate the software's ability to address security concerns by ensuring that admin accounts are not present on customer endpoints, which is the best benefit it offers. The content rules feature is particularly useful as it enables people to restrict access to files effectively. However, the standout feature is the standard rules for elevating privileges on-demand or through just-in-time elevation, which I consider to be the most important capability of the software. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Endpoint Privilege Management?

I would like to see the option to include options in messages (e.g. designated authentication or MFA) for better flexibility. Review collected by and hosted on G2.com.

DK
IT Security Administrator
Mid-Market (51-1000 emp.)
"Good control for endpoint privileges with minimal hassle!"
What do you like best about BeyondTrust Endpoint Privilege Management?

I like that it helps manage user permissions without locking people out of their work. It gives just enough access for each role and that keeps the system secure without constant IT involvement. The policies are flexible and I can easily adjust privilege levels or create exceptions when needed. It also logs activity clearly so we can track changes and approvals. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Endpoint Privilege Management?

The policy setup can be a bit detailed for beginners. It takes time to understand how each rule interacts and sometimes needs testing before it works smoothly. Review collected by and hosted on G2.com.

Himanshu K.
HK
IT Security Operations Engineer
Enterprise (> 1000 emp.)
"EPM Anyone? BeyondTrust should be your pick!"
What do you like best about BeyondTrust Endpoint Privilege Management?

This tool is just great. I love how flexible it is for setting up custom policies, custom configurations, setting up user groups etc. it just works! I never had a problem with its working. it has given us so many great insights about what our people are doing and how they're using privileged access, the insights we might never get if we didn't had EPM. We deployed it for our developers currently for some super flexible policy and some more sctricter policies for departments that doesn't need admin rights more often. it works so well that sometimes I even forget we have a tool like this. I hardly had to use the console to do some stuff, its basically a fire-and-forget tool. our IT Ops team love it, it has drastically changed the number of IT tickets for them related to admin rights etc. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Endpoint Privilege Management?

Their API and third party integration could've been better, we had a hard time setting up some automation to approve JIT requests etc but we managed to get it done. Review collected by and hosted on G2.com.

Verified User in Mechanical or Industrial Engineering
AM
Mid-Market (51-1000 emp.)
"BeyondTrust:"
What do you like best about BeyondTrust Endpoint Privilege Management?

- Being able to control and secure programs that users can install/run with elevated permissions in realtime allows us IT professionals to further secure our environment.

- A versatile tool to block the uninstall of certain programs and allow the uninstall of others at the same time

- Used daily to allow permissions or change permissions of certain groups and people

- Implementing and upgrading the clients is easy if you push the client once, push their proprietary Package Manger to all PC's, then allow auto-upgrades in the web client, which also auto-updates their web adapter Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Endpoint Privilege Management?

- Whitelisting via publisher/more secure methods such as file version, etc, sometimes seems to not work properly, instead of whitelisting an entire path which could get compromised

- Some features that need tutorials/documentation to understand are not there/not fully fleshed out, or are extremely confusing to set up, which requires a lot of testing

- Assigning permissions to application groups such as Admin tokens or Basic tokens can get confusing and also cause issues within the environment

- Basically: steep learning curve, but rewarding once learnt Review collected by and hosted on G2.com.

Vatsal K.
VK
Supervisor
Mid-Market (51-1000 emp.)
"Solid control over endpoint access, but a bit of learning curve."
What do you like best about BeyondTrust Endpoint Privilege Management?

It does a good job of reducing risk by letting us remove admin rights without annoying the users too much. We can allow specific apps to run with elevated rights, and it helps avoid getting blanked permissions. Once it is integrated, it works pretty goof and the audit logs are very useful. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Endpoint Privilege Management?

The implementation took longer than expected, and the policy creation process wasn't very intuitive at first. Some updates caused minor disruptions, and the user interface could be a bit more modern, nothing deal-breaking though. Review collected by and hosted on G2.com.

RP
IT Security Analyst
Enterprise (> 1000 emp.)
"Security Efficient"
What do you like best about BeyondTrust Endpoint Privilege Management?

we can manage administratively and more efficiently Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Endpoint Privilege Management?

We encounter some of our deployments are having issue on corrupted. Review collected by and hosted on G2.com.

Kiran G.
KG
Senior IT Executive
Mid-Market (51-1000 emp.)
"BeyondTrust is more than just trust—and it’s truly worthy"
What do you like best about BeyondTrust Endpoint Privilege Management?

One key strength of BeyondTrust Endpoint Privilege Management (EPM) is its powerful True Least Privilege enforcement paired with granular Application Control—a combination that significantly enhances both security and user productivity. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Endpoint Privilege Management?

Mac/Linux support missing some advanced features. Review collected by and hosted on G2.com.

RL
Systems Analyst
Mid-Market (51-1000 emp.)
"A great tool for security"
What do you like best about BeyondTrust Endpoint Privilege Management?

It helps me removes extra admin rights without bothering users

It reduces IT help desk requests

It keeps security strong and meets compliance rules Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Endpoint Privilege Management?

Can be complex to setup.

A bit expensive for small businesses Review collected by and hosted on G2.com.

Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

BeyondTrust Endpoint Privilege Management Comparisons
Product Avatar Image
Microsoft Entra ID
Compare Now
Product Avatar Image
Delinea Secret Server
Compare Now
Product Avatar Image
Admin By Request
Compare Now
BeyondTrust Endpoint Privilege Management Features
Multi-Factor Authentication
Single Sign-On
Centralized management
Audit Logging
Activity Logging
Policy, User, and Role Management
Approval Workflows
Automated Provisioning
Audit log
Reporting
Product Avatar Image
Product Avatar Image