We performed a comparison between BeyondTrust Privileged Remote Access and Delinea Secret Server based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The security provided by PRA when it comes to access for remote and privileged users has been outstanding. It has met all of our objectives, everything from password rotation to securing and allowing us to clamp down access to the auditing and monitoring features."
"We can truly elevate our admin rights while we're in there to fully take control of a system and manage it as if it was sitting right here on our desk. Most of the organization has gone to remote work or work from home. With that being the case, this solution allows us to be able to still work with our end-users, even though they're not always sitting on our network."
"PRA stands on its own as a full solution. This is important because it reduces the need to maintain a lot of different services. Also, the integration between those services are sometimes not easy to maintain. So, having a solution like BeyondTrust Privileged Remote Access reducing our workload gives us enough time to work on our other issues. The system just runs and does what it is supposed to do."
"The project goal was to allow staff to run applications with admin privileges without being admins, which was the product's most important feature."
"When it comes to the Privileged Remote Access (PRA) solution, instead of depending on a VPN client, from Cisco or any other vendor, we can directly use this product from the internet. It is very easy to do the implementation, and it is easy for every user to access the server from outside of their organization. They can open the URL and put their name and password, and it'll do the multi-factor authentication. They can easily access the server. Prior to this solution, the users had to log into the VPN, which is not required with BeyondTrust. Now, they can use their computer over the internet."
"It's a stable product. Based on the demos and interaction with it, it was stable."
"This product is very stable and scalable. This is an excellent platform."
"I like all of it. You can access computers that are on a DMZ. You can access computers that are off the network and on the network. You pretty much have access to computers wherever they are. As long as they have the client on them, you can get to them. So, it is convenient, but its main feature is that you can use your smart card to elevate your privileges remotely. That's a great feature."
"It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment."
"The surveillance is most valuable."
"Ease of use because of its monolithic software."
"The most valuable feature of Delinea Secret Server is secret password management."
"The solution is scalable."
"Support is helpful."
"I like that it is Windows-based. It is good that primarily, it is not an appliance. Some of the other applications in the space, such as a Quest Software CPAM or a Safeguard, are appliances, so you can't deploy the ends of them. With Thycotic, you can either install your Temporal Protection module physically in the VM host, or you can use BouncyCastle for high-security module capabilities."
"What I like best about this product is the interface."
"The solution's Vault is a nice feature. It helps to securely share a security password in teams, but it is not at the level of a password management solution. So, it is just really a vault. We were expecting to have more features to better manage passwords, but that is something that you can work around if you also have a password safe solution. I would like them to have features like password rotation or password auditing, e.g., old passwords."
"Changing your password should be simplified, and there should not be a charge for it."
"Its access process for third-party vendors needs to be simplified."
"The issue I found with the product revolves around the fact that RDP and SSH sessions take too much time, making it an area of concern where improvements are required."
"When doing protocol panel jumps, the tool does not restrict what is recorded on the user's computer."
"Some of the capabilities in the solution were not as available or not as outstanding as CyberArk. We had to manage whatever little was available for us, especially its recording capabilities, logs, and a number of things."
"The solution is very flexible, which is a plus, but I would say the implementation requires someone with knowledge and experience, as it can be easy to get lost in all the details. The implementation process could be streamlined and simplified. Though the complexity of the solution provides greater flexibility, it requires a lot of time to understand it fully."
"It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution."
"They could improve the container platform and SPO."
"One thing that I wish they would do is to have a Kubernetes or container-based deployment supported, but they're not quite there yet. Containerization or support for containerization would be fantastic."
"The solution could be more user-friendly."
"We could definitely use some help with API tokenization. If we had a way to store tokens that would be fabulous."
"I don't know what kind of a cryptographic it uses to encrypt the password but it should be one of the stronger ones. Some of the cryptos have been accessed by hackers."
"In many PAM tools, when users request a password checkout, they need to provide justification. However, in my experience across four organizations, nobody actually reads the justifications. Users can simply type anything and get the password. This becomes a risk and compliance issue. There needs to be continuous improvement in this area, focusing on problem identification and mitigation strategies."
"Installation can sometimes be difficult, depending on the environment."
"The technical support needs improvement. For example, if you have any problems on the server configuring the IIS, they would provide you very limited details and they would tell you the problem is on your end."
More BeyondTrust Privileged Remote Access Pricing and Cost Advice →
BeyondTrust Privileged Remote Access is ranked 3rd in Privileged Access Management (PAM) with 21 reviews while Delinea Secret Server is ranked 2nd in Privileged Access Management (PAM) with 47 reviews. BeyondTrust Privileged Remote Access is rated 8.6, while Delinea Secret Server is rated 8.2. The top reviewer of BeyondTrust Privileged Remote Access writes "Our support team can do so much more without having to actively engage our customers, which saves us time and money". On the other hand, the top reviewer of Delinea Secret Server writes "Effective for password rotation policies triggered by audit requirements, it helps maintain compliance standards and seamless integration with third-party tools ". BeyondTrust Privileged Remote Access is most compared with CyberArk Privileged Access Manager, WALLIX Bastion, Citrix DaaS (formerly Citrix Virtual Apps and Desktops service), BeyondTrust Remote Support and ARCON Privileged Access Management, whereas Delinea Secret Server is most compared with CyberArk Privileged Access Manager, Azure Key Vault, HashiCorp Vault, IBM Security Secret Server and ManageEngine PAM360. See our BeyondTrust Privileged Remote Access vs. Delinea Secret Server report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Hello Avinash, it all depends on the timeline and urgency of the project. If you need to deploy a PAM tool that focuses on standing privileges, stopping lateral movement, and incorporating Zero Standing Privileges as part of Zero Trust, then please consider looking at Remediant. I've worked for BeyondTrust and have gone up against the other big players such as Delinea, Centrify, CyberArk, and HashiCorp. They more or less all offer similar solutions, but looking at your current requirements, Remediant really excels in delivering a simple, yet very effective tool in a matter of days and weeks, not months and years.