We changed our name from IT Central Station: Here's why

BeyondTrust Endpoint Privilege Management vs ManageEngine Key Manager Plus comparison

Cancel
You must select at least 2 products to compare!
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
  • "This solution is expensive compared to its competitors."
  • "Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
  • More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    563,327 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: 
    It is straightforward. It is a good technology, and it is made to do one single thing.
    Top Answer: 
    Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly… more »
    Top Answer: 
    They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic… more »
    Ask a question

    Earn 20 points

    Ranking
    Views
    7,951
    Comparisons
    5,481
    Reviews
    3
    Average Words per Review
    631
    Rating
    7.7
    Views
    308
    Comparisons
    225
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    BeyondTrust PowerBroker, PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix
    Learn More
    Overview

    BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.

    Key Solutions Include:

    -ENTERPRISE PASSWORD SECURITY

    Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.

    -ENDPOINT LEAST PRIVILEGE

    Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.

    -SERVER PRIVILEGE MANAGEMENT

    Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.

    -A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS

    Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.

    Learn more at https://www.beyondtrust.com/privilege-management

    ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues.

    Offer
    Learn more about BeyondTrust Endpoint Privilege Management
    Learn more about ManageEngine Key Manager Plus
    Sample Customers
    Aera Energy LLC, Care New England, James Madison University
    Sapphire Systems
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company27%
    Comms Service Provider19%
    Financial Services Firm7%
    Government5%
    VISITORS READING REVIEWS
    Computer Software Company30%
    Insurance Company9%
    Comms Service Provider9%
    Manufacturing Company6%
    Company Size
    REVIEWERS
    Small Business56%
    Midsize Enterprise6%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise31%
    Large Enterprise42%
    No Data Available
    Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management (PAM). Updated: January 2022.
    563,327 professionals have used our research since 2012.

    BeyondTrust Endpoint Privilege Management is ranked 4th in Privileged Access Management (PAM) with 6 reviews while ManageEngine Key Manager Plus is ranked 5th in Certificate Management Software. BeyondTrust Endpoint Privilege Management is rated 8.6, while ManageEngine Key Manager Plus is rated 0.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "A stable, scalable, and easy-to-deploy solution that can track malicious use or send analytics to a host". On the other hand, BeyondTrust Endpoint Privilege Management is most compared with CyberArk Privileged Access Manager, Thycotic Secret Server, CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine) and ARCON Privileged Access Management, whereas ManageEngine Key Manager Plus is most compared with Thycotic Secret Server, ARCON Privileged Access Management, Microsoft Azure Key Vault and AppViewX CERT+.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.