BeyondTrust Endpoint Privilege Management

Eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity.

Languages supported:

7.8/10 (Expert Score) ★★★★★
Product is rated as #26 in category Privileged Access Management (PAM) Software
Ease of use
8.7
Support
7.6
Ease of Setup
0.0

BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.

Key Solutions Include:

ENTERPRISE PASSWORD SECURITY
Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.

ENDPOINT LEAST PRIVILEGE
Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.

SERVER PRIVILEGE MANAGEMENT
Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.

A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS
Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.

Learn more at https://www.beyondtrust.com/privilege-management

BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management

Show more categories

Customer Reviews

BeyondTrust Endpoint Privilege Management Reviews

Ragunath M.

Advanced user of BeyondTrust Endpoint Privilege Management
★★★★★
Easy To Use PAM Application With Comprehensive Features!

What do you like best?

Whitelisting the most common applications (used in our organization) which require admin privileges to install or run has made day to day operations really smooth. Users are able to work with the right amount of privilege access, there by not posing a security risk for our organization.

What do you dislike?

There are few nagging issues which we have been unable to totally resolve as of now. Like when user saves file directly on the C Drive (windows install directory), the files are being protected and beyond trust doesn't allow the user to delete or modify it. Few users have complained about system performance taking a hit after we deployed beyond trust on their machine.

Recommendations to others considering the product:

Beyond Trust Privilege Access Management has been really good for our environment, many of our end users were having local admin access on their machines which posed a huge security risk. We have been able to successfully eliminate this and provide on demand token based admin rights. Has considerably reduced calls to helpdesk which has taken work load of the team.

What problems are you solving with the product? What benefits have you realized?

We had to eliminate providing admin rights to end users as it was posing a security threat, beyond trust has been excellent in doing the same without compromising the ability of the users to work.

Review source: G2.com

Leave a reply

Your total score

B2B Software Guide