Need advice about which tool to choose?Ask the StackShare community!

BeyondTrust

9
19
+ 1
0
Centrify

13
31
+ 1
0
Add tool

BeyondTrust vs Centrify: What are the differences?

# Introduction
  1. Licensing Model: BeyondTrust typically operates on a user-based licensing model, while Centrify offers both user-based and server-based licensing options, providing flexibility for different enterprise structures and needs.
  2. Features and Capabilities: BeyondTrust specializes in privileged access management solutions, offering features such as session monitoring and access control, while Centrify focuses on identity management and single sign-on capabilities.
  3. Market Focus: BeyondTrust is more commonly used in industries with strict security and regulatory requirements, such as financial services and healthcare, whereas Centrify caters to a broader range of industries with a focus on ease of use and integration.
  4. Integration with other Systems: Centrify is known for its seamless integration with cloud services and enterprise applications, while BeyondTrust focuses more on integration with security monitoring tools and vulnerability management systems.
  5. Support and Customer Service: BeyondTrust is praised for its responsive customer support and comprehensive training resources, while Centrify is recognized for its user-friendly interface and ease of implementation.
  6. Deployment Options: BeyondTrust offers on-premises, cloud, and hybrid deployment options, whereas Centrify primarily focuses on cloud-based solutions, catering to organizations looking to move towards a cloud-centric infrastructure.
In Summary, BeyondTrust and Centrify differ in their licensing model, features, market focus, integration with other systems, support services, and deployment options.
Get Advice from developers at your company using StackShare Enterprise. Sign up for StackShare Enterprise.
Learn More

What is BeyondTrust?

It supports a family of privileged identity management, privileged remote access, and vulnerability management products for UNIX, Linux, Windows and Mac OS operating systems.

What is Centrify?

It is privileged identity management and identity as a service solutions stop the breach by securing access to hybrid enterprises through the power of identity services.

Need advice about which tool to choose?Ask the StackShare community!

What companies use BeyondTrust?
What companies use Centrify?
    No companies found
    See which teams inside your own company are using BeyondTrust or Centrify.
    Sign up for StackShare EnterpriseLearn More

    Sign up to get full access to all the companiesMake informed product decisions

    What tools integrate with BeyondTrust?
    What tools integrate with Centrify?

    Sign up to get full access to all the tool integrationsMake informed product decisions

    What are some alternatives to BeyondTrust and Centrify?
    TeamViewer
    Its aproprietary software for remote control, desktop sharing, online meetings, web conferencing and file transfer between computers.
    CyberArk
    It is the only security software company focused on eliminating cyber threats using insider privileges to attack the heart of the enterprise.
    Okta
    Connect all your apps in days, not months, with instant access to thousands of pre-built integrations - even add apps to the network yourself. Integrations are easy to set up, constantly monitored, proactively repaired and handle authentication and provisioning.
    AWS IAM
    It enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
    Teleport
    Teleport makes it easy for users to securely access infrastructure and meet the toughest compliance requirements. Teleport replaces shared credentials with short-lived certificates and is completely transparent to client-side tools.
    See all alternatives