Centrify vs BeyondTrust

Implement the right PAM solution to protect your business, stop breaches, and qualify for cyber insurance. Use the PAM evaluation guide to see how Centrify compares to BeyondTrust.

  • Swiftly implement least privilege and reduce risks

  • Experience a superior UX and implementation process

  • Achieve security goals without impacting productivity

  • Receive customer support that goes beyond

Trusted by Over 20,000 Companies and Counting

  • Starbucks
  • Wynn Resorts
  • eBay
  • CSC
  • Willams-Sonoma
  • IHG
  • Carbonite
  • RBC

Why Trust BeyondTrust PAM?

1. We're Recognized as a Leader by Analysts and Customers

Year-after-year the top industry analysts recognize us as a PAM Leader. But we are even more proud of the recognition we receive from our customers.

BeyondTrust is honored to receive the Customers' Choice distinction in the Gartner Peer Insights "Voice of the Customer': Privileged Access Management" report. You can check what our customers have to say about us on the Gartner Peer Insights platform, where we have over 380 five-star reviews.

We're also continually recognized and recommended by our employees for an outstanding work environment.

BeyondTrust is annually recognized as one of the top places to work. Fortune Magazine and Great Place to Work rank us as the "#22 Best Workplace in Technology (Large)".

2. We Offer the Only True PAM Platform

BeyondTrust has the most integrated, complete, and true PAM platform.

This makes it easier to view and addresses risk across enterprises that may be comprised of multiple clouds and other technology platforms.

With the recent merger of Centrify and Thycotic to form Delinea, BeyondTrust is leaps and bounds ahead in terms of overall product integration.

The centralized BeyondTrust platform provides heightened value to customers, from centralized management and policy, to integrated reporting and threat analytics, to cross-cloud and on-premises visibility and administration. This results in less cost, less complexity, and fewer security and compliance gaps from using siloed tools.

The breadth of our solutions and flexibility of our platform enable you to handle today’s threat scenarios and prepare for tomorrow’s digital transformation possibilities.

3. We Solve the Most PAM Use Cases

No other vendor can compare in the depth and breadth of privileged access security use cases. We cover it all — Windows, macOs, Unix, Linux, cloud, on-premise, hybrid.

BeyondTrust pioneered many of today's must-have PAM capabilities. We supported remote work and work-from-anywhere (WFA) for our employees well before it became commonplace. Our remote access security solutions for insiders and vendors were launched years ahead of alternative offerings. It’s probably because we supported remote work and work-from-anywhere (WFA) for our employees well before it became commonplace. Other vendors are still trying to catch up as we continue to make our secure remote access capabilities even more robust and easy to use.

File integrity monitoring and trusted application protection, which protects against tricky fileless threats used in today’s most sophisticated attacks, are just a few ways our solutions are differentiated from others. With BeyondTrust, a full suite of PAM tools are at your teams' disposal.

4. We Provide More Flexible Deployment Options

Unlike other PAM vendors, BeyondTrust doesn’t force you to do Privileged Access Management “our way."

While you can start with a password vault (Password Safe), you don’t have to. You could just as easily start with Secure Remote Access, AD Bridge, or Endpoint Privilege Management for Windows, macOs, Linux, or Unix.

We also give you the choice of deployment model that best suits your needs — on-premises, private cloud, or SaaS.

No PAM vendor provides more choices. Whichever product or deployment model you begin with, you will start immediately reducing risk and improving administration.

5. We Simplify Compliance & Cyber Insurance Qualification

BeyondTrust’s integrated platform excels at capturing the right data.

Our platform puts privileged access, session, and identity data at your fingertips, so your people can act on it instantly and decisively, and so your auditors are satisfied.

Zero trust frameworks are increasingly being adopted by compliance initiatives. Our solutions also help address the Seven Tenets of Zero Trust and map to a Zero Trust Architecture (ZTA) as defined by NIST.

The capabilities and reporting features of BeyondTrust PAM solutions also check the box for a number of security controls explicitly required by cyber insurers in order to qualify for cyber insurance coverage.

Read the Complete Evaluation Checklist

Start comparing BeyondTrust against other PAM vendors like Centrify to learn what sets us apart.