ARCON Privileged Access Management vs BeyondTrust Privileged Remote Access comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between ARCON Privileged Access Management and BeyondTrust Privileged Remote Access based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
772,679 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"That dashboard is okay.""The best part of this product is the administrator convenience. The portal is very user-friendly. An administrator can use it very easily.""The video logs help us to identify any misuse of privileged accounts.""We use ARCON Privileged Access Management to monitor and record our admin users' activity.""Previously, we had to go through some effort to change the credentials of our devices. The process was subject to human error... For things like managing credentials, some kind of register had to be maintained. With the Password Vault of ARCON, all these processes are automated. The credentials are changed, as per the schedule. The information is encrypted, kept in our vault, and sent to all the email addresses within the ARCON solution itself.""One of the main benefits we've experienced is that Arcon helps us manage all our team's tasks and provides recording capabilities.""For compliance, each change I do, in each of the servers, is clearly recorded. We recently faced an audit and this was an awesome feature. Even our auditor had praise for it saying, "This is really a good feature."""With this log available, we can drill down to the activities performed by the people within our kiosk. There is a great feature where in the case of Unix servers, we have our own text-based logs. In the case of Window's server, we cannot create a text-based log, so our kiosk takes the screenshot or picture of the screen when I am working. It does this every three seconds."

More ARCON Privileged Access Management Pros →

"This product is very stable and scalable. This is an excellent platform.""The project goal was to allow staff to run applications with admin privileges without being admins, which was the product's most important feature.""Based on the feedback from my colleagues who have never complained about the technical support, I would say that the product's support team is good.""The security provided by PRA when it comes to access for remote and privileged users has been outstanding. It has met all of our objectives, everything from password rotation to securing and allowing us to clamp down access to the auditing and monitoring features.""The most valuable feature is that this solution can be implemented regardless of the operating system.""I like all of it. You can access computers that are on a DMZ. You can access computers that are off the network and on the network. You pretty much have access to computers wherever they are. As long as they have the client on them, you can get to them. So, it is convenient, but its main feature is that you can use your smart card to elevate your privileges remotely. That's a great feature.""It is a real fortress. Its security is very strong. Multi-factor came as a feature out-of-the-box, which was big for us. That helps us meet another compliance requirement. It enforces encryption. Nobody can see what we are doing in our remote system if they happen to be listening for unencrypted traffic. That is its biggest strength.""One of the features that I really like about it is the ability to set a start date, time, and end date for the access. For example, you can set the access for a person from tomorrow, Monday, or Tuesday and ending on a specific period of the day or a specific date. That's really quite helpful."

More BeyondTrust Privileged Remote Access Pros →

Cons
"I'll provide feedback on additional features after the project is completed. I think it would be better to comment on that after the implementation is finished.""It should be browser-agnostic and, frankly, it is working well on Internet Explorer. It should work on popular browsers like Mozilla and Firefox.""Currently, we can manage only the SSH or RDP connections, but there are many more devices that are present, apart from our SSH and RDP. We want all this to be part of the ARCON solution. For the password management, they should increase the pool of supported devices, they should have more connectors.""There are some features lacking but they typically are added when the upgrades are released.""There are no APIs readily available... I'm working on automation for ARCON so that whatever the ARCON administrator is doing will be automated, rather than having to do it manually. For that, I had to spend months to get the API developed myself. Having that handy out of the box, that would really help...""One thing which needs improvement is where it is keeping video logs of Windows Servers, whatever activities are being carried out by the administrator. Because Windows logs are a video, they are unsearchable, so if you need to search for a specific administrator and what he has done on a server, right now you need to go through different video logs of that particular timeframe. I think they are coming up with an additional feature where in it can be indexed and can be searchable.""I would like to see a "wild card" kind of a feature or something that would enable us to search the video.""The solution needs more work on the password management side of things. Password management is a big challenge for us, and I would like to improve this aspect. We're finding that BeyondTrust is better in this regard, which is why we're probably going to migrate over. It will offer better security I think."

More ARCON Privileged Access Management Cons →

"When doing protocol panel jumps, the tool does not restrict what is recorded on the user's computer.""Multiple areas can be improved. We've seen lots of updates in the past year. They have a portal where we can submit our ideas. BeyondTrust is immediately implementing user suggestions. The UI could be more informative. Initially, there were two or three connectors, and now we have five or six. It would be nice if they added a few more connectors for third-party integration. There are multiple tools, but the clients may require more for their convenience.""It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution.""At the moment, I don't see any major problems with it. If anything, they can just change the look and feel of the login screen because it looks too simple to me. It does not have so much information. When you get to the login screen of the solution, you should have more information. We also have BeyondTrust Remote Support, and the login page looks similar to BeyondTrust Privilege Remote Access. I would love to see more rich information on the login screen or landing page so that rather than having a regular sign-in screen or page where you just provide a username and password and get into the solution, you should have more insight into what the solution does. I've mentioned this to them every time I have had an opportunity.""The solution's Vault is a nice feature. It helps to securely share a security password in teams, but it is not at the level of a password management solution. So, it is just really a vault. We were expecting to have more features to better manage passwords, but that is something that you can work around if you also have a password safe solution. I would like them to have features like password rotation or password auditing, e.g., old passwords.""The integration client, backup solution, and SSO setup and provisioning could be improved. There isn't any documented or supported user provisioning currently, which slows down the processes of onboarding and assigning permissions. I would like to see this improved soon.""One of our gaps or pain points is having multi-factor authentication at the endpoint and using the PRA password injection from BeyondTrust, which does not work in our environment. We can only have MFA at the login of BeyondTrust to check out the password. Therefore, we can't meet our security requirements of having it on the endpoint.""Its access process for third-party vendors needs to be simplified."

More BeyondTrust Privileged Remote Access Cons →

Pricing and Cost Advice
  • "Pricing is low and licensing is flexible."
  • "Pricing is reasonable."
  • "ARCON is a will give you all the features in a very cost-effective solution. Pricing and licensing is very good compared to other players in the market."
  • "The product is available with competitive pricing. Licensing is not complex. We calculated the license requirements by counting the number of admins and the number of devices which were going to integrate with it."
  • "The pricing and licensing model is very economical."
  • "Pricing and licensing are good, very aggressive."
  • "I am not in a position to give any financials, but whatever we have paid, it is value for money. Their licensing model is good. They have been flexible for us."
  • "The product's pricing is good value. Go for user-based licensing, without any limit on the target servers."
  • More ARCON Privileged Access Management Pricing and Cost Advice →

  • "The price is pretty expensive, but you get what you pay for and this is a great product."
  • "I wish it was a little bit cheaper, but when a product is as solid as this, I understand what the cost does. It helps them to make sure it stays that way. If you want a reliable, solid product, you're going to pay more."
  • "Don't get into a situation where you are licensing per desktop or per person until you fully understand the licensing."
  • "My client found the solution a bit expensive but considering their use case and requirements, they didn't have any other choice. As far as I know, implementation and licensing are the only costs."
  • "I wasn't directly involved in the licensing and pricing, but I can say that PRA is licensed per endpoint added to the Vault. I would advise users to take frequent exports of their license usage package; it's a simple feature that provides a spreadsheet of every machine in the Vault. This helps to cut down on duplicate licenses, which can happen by adding the same endpoint using an IP address and a fully qualified domain name, for instance. The implementation is an additional cost, and they offer several tiers, so the price varies. There are also some optional add-ons, so I would advise people to research the product well and find out precisely what they need regarding features. The Advanced Web Access add-on provides some required functionality when interfacing with websites; that's one to consider."
  • "Its price is pretty good for the features and services that it provides. It is not outrageous. I'm not aware of any additional charges or anything like that."
  • "PRA was one of the cheapest solutions that we evaluated."
  • "Though the solution was a bit expensive, the overall pricing was average."
  • More BeyondTrust Privileged Remote Access Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    772,679 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Some options are required in the tool, especially to help in scenarios where if a user's ID gets locked, that person cannot unlock the ID from ARCON Privileged Access Management. Even the technical… more »
    Top Answer:The product has improved remote support capabilities since it works fine.
    Top Answer:The issue I found with the product revolves around the fact that RDP and SSH sessions take too much time, making it an area of concern where improvements are required. The product should be able to… more »
    Top Answer:I use the tool in my lab. I am involved in the product's testing phase in my lab, where I am trying to check out the solution.
    Ranking
    Views
    3,495
    Comparisons
    1,308
    Reviews
    10
    Average Words per Review
    373
    Rating
    7.7
    Views
    2,405
    Comparisons
    1,551
    Reviews
    15
    Average Words per Review
    1,269
    Rating
    8.3
    Comparisons
    Also Known As
    ARCON ARCOS, ARCON PAM
    Bomgar Privileged Access
    Learn More
    Overview

    ARCON PAM is a full blown Privileged Access Management solution. It has a robust password vaulting technology that comes with AES- 256 Database encryption. Dual Factor Authentication, 4Eye Authentication functionalities and Granular Access Control enables an enterprise to block any unauthorized access attempt to critical information assets. All access is based on “Need to know” and “Need to do” basis. It has the largest connector stack. Its Single Sign On enables seamless access to a host of devices with just a single click.

    The Solution enables an enterprise to monitor and analyze advanced threats in a real time. It has the best-in-class real-time threat analytics. It provides comprehensive audit trails and session recordings to ensure that all activities are tracked and these logs are encrypted and separately stored creating a legal hold.

    Further, it has a highly scalable architecture that easily integrates with Third Party SIEM Solutions. It also supports cloud environment.

    ARCON PAM is full-functionality solution at the most optimum pricing. More than 250 global enterprises spanning wide-ranging industries such as Banking, Financial Services and Insurance (BFSI), Government Organizations, Media, Health Care, and Fintech have deployed ARCON PAM as of today.

    While the company continues to be a leader in India and the Middle East, it has gained a solid traction in Africa and APAC market thanks to its well-distributed global channel network and strong industry reputation it enjoys in the cyber security domain.

    BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.

    Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security.

    Features include:

    - Privileged Access Control: Enforce least privilege by giving users the right level of access.

    - Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections.

    - Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway.

    - Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials.

    - Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere.

    - Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.

    Sample Customers
    RAK Bank, AXIS Bank, Reliance Capital, Kotak Life Insurance, MTS
    Horizon Beverage, Air Liquide, Gateway Bank of Florida
    Top Industries
    REVIEWERS
    Financial Services Firm52%
    Healthcare Company9%
    Computer Software Company9%
    Construction Company4%
    VISITORS READING REVIEWS
    Educational Organization61%
    Computer Software Company9%
    Financial Services Firm4%
    Retailer3%
    REVIEWERS
    Comms Service Provider21%
    Government14%
    Wholesaler/Distributor14%
    Computer Software Company14%
    VISITORS READING REVIEWS
    Computer Software Company18%
    Financial Services Firm10%
    Government9%
    Manufacturing Company7%
    Company Size
    REVIEWERS
    Small Business25%
    Midsize Enterprise28%
    Large Enterprise47%
    VISITORS READING REVIEWS
    Small Business10%
    Midsize Enterprise65%
    Large Enterprise25%
    REVIEWERS
    Small Business50%
    Midsize Enterprise15%
    Large Enterprise35%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise13%
    Large Enterprise65%
    Buyer's Guide
    ARCON Privileged Access Management vs. BeyondTrust Privileged Remote Access
    May 2024
    Find out what your peers are saying about ARCON Privileged Access Management vs. BeyondTrust Privileged Remote Access and other solutions. Updated: May 2024.
    772,679 professionals have used our research since 2012.

    ARCON Privileged Access Management is ranked 8th in Privileged Access Management (PAM) with 32 reviews while BeyondTrust Privileged Remote Access is ranked 3rd in Privileged Access Management (PAM) with 21 reviews. ARCON Privileged Access Management is rated 7.8, while BeyondTrust Privileged Remote Access is rated 8.6. The top reviewer of ARCON Privileged Access Management writes "Offers good session monitoring and recording features". On the other hand, the top reviewer of BeyondTrust Privileged Remote Access writes "Our support team can do so much more without having to actively engage our customers, which saves us time and money". ARCON Privileged Access Management is most compared with CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), ManageEngine PAM360, BeyondTrust Endpoint Privilege Management and Sectona Privileged Access Management, whereas BeyondTrust Privileged Remote Access is most compared with CyberArk Privileged Access Manager, Citrix DaaS (formerly Citrix Virtual Apps and Desktops service), WALLIX Bastion, BeyondTrust Remote Support and Microsoft Remote Desktop Services. See our ARCON Privileged Access Management vs. BeyondTrust Privileged Remote Access report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.