We performed a comparison between BeyondTrust Endpoint Privilege Management and VMware Carbon Black Endpoint based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"Scalability is good. I would rate the scalability a nine out of ten."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference."
"The tool is easy to use and deploy. It has PAM capabilities like privilege access. The solution helps with the management of third parties and vendors. It is an effective solution compared to other alternatives."
"I find the solution’s features like section management, password management, and analytics valuable."
"The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager."
"Behavioral Monitoring stops known malicious events before they even begin."
"This product has the capability of uploading scripts to the tool and this is a very comprehensive feature."
"It is a scalable solution...The initial setup was straightforward."
"The data analysis is the most valuable because of the whitelist database. It is different than standard IDS solutions."
"The most valuable feature is that it detects and stops malicious executables."
"It has intelligent learning behind it and we have been very successful in preventing attacks."
"The tool is pretty stable."
"The whole purpose of the product, like application control, is very good, and also if you need to update some policies, it works well and instantly."
"The deployment process should be clarified or made simpler. It would be helpful if the solution had in-app tutorials for users to look at as they progress through the system. Sometimes we get lost and need to go back to check what exactly the function was. There should be small hints around major key functions. It would go a long way in speeding up the deployment process."
"How the accounts are presented in the solution's UI can be improved."
"The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features."
"The help system should be improved to provide a quick help guide with each tab within the solution, which explains what each particular function does."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"There are three types of endpoints. If we need to use them in the solution, then we need to purchase the licenses separately. The tool needs to improve its licensing."
"The product should improve its price."
"There is room for improvement in the support and service team."
"Certain settings have limitations. For example, I cannot manually block some malware activities."
"This solution could have greater granular control on how certain applications work."
"The support is poor."
"Performing a malware scan usually takes a lot of time, more than 24 hours."
"When you view the triage, it will show you everything within a given time frame, and not only the attack that caused the alert, which is what I want to see. It shows you all the events during that time, and that can be quite confusing."
"The GUI and reporting should be addressed and the product's administration features need fine tuning."
"Carbon Black CB Defense has helped improve my organization by allowing us to have better data so that we can do correlation and get visibility into the alerts."
More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →
BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 28 reviews while VMware Carbon Black Endpoint is ranked 17th in Endpoint Protection Platform (EPP) with 63 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while VMware Carbon Black Endpoint is rated 7.8. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of VMware Carbon Black Endpoint writes "Centralization via the cloud allows us to protect and control people working from home". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas VMware Carbon Black Endpoint is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne Singularity Complete, Trend Micro Deep Security and Symantec Endpoint Security.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.