BeyondTrust Privileged Remote Access Competitors and Alternatives

Get our free report covering WALLIX, CyberArk, One Identity, and other competitors of BeyondTrust Privileged Remote Access. Updated: January 2021.
464,369 professionals have used our research since 2012.

Read reviews of BeyondTrust Privileged Remote Access competitors and alternatives

reviewer1308201
Information Security | Cybersecurity | VP, Cybersecurity Manager at a financial services firm with 1,001-5,000 employees
Real User
Top 5
Mar 12, 2020
Functionality is straightforward with a simple checkout process and integration of checkout proxy ID

What is our primary use case?

We started with administrative use cases and we were able to take control of all the local administrator accounts for endpoints and servers. We then started controlling privileged accounts for our domain administrators as well as for any kind of privileged account that had access to our switches, routers, and the like. This year we're looking at taking control of all of the servers and application accounts. But that's going to be a longer journey for us because there are a lot more of those accounts, and there is a lot more testing that needs to be done because of the nature of the accounts… more »

Pros and Cons

  • "It's one of the best products we've seen. When you start looking at the functionality and use cases and usability of the product, it's straightforward. They designed this product with the end-user in mind, and they also had the sysadmin who is supporting the product in mind. They really did a nice job. Overall, it's a nice product to work with."
  • "From a usability perspective, what we are finding out is that our privileged domain admin users, in particular, want functionality for extending a checkout session. So we are working with One Identity support to see if there's an enhancement that can be made to the product."

What other advice do I have?

Start with your current state. That's what we did. Then, create a roadmap of where you are, where you need to be over the next five years. Once you're able to assess the current state and you have a plan in place, you can pick the product that's going to help you get to that future state. The biggest lesson I have learned from using this product is to be open-minded in trying to figure out where we could use some enhancements. Just because you choose a product you don't have to be 100 percent, all-in on the product. There is always room for opportunities. Whenever there is feedback or…
reviewer1284300
Pre Sales/Technical Engineer at a tech services company with 11-50 employees
Real User
Feb 19, 2020
Good user interface and session monitoring and easy to set up

What is our primary use case?

I primarily use the solution for PRAM management, privileged access management, and other similar tasks as well. We submit credentials and replicate and post them directly behind the scenes. There's also some session monitoring and issue recording, etc. that we handle.

Pros and Cons

  • "The user interface is quite good. It's very straightforward."
  • "There could be tweaks here and there. For example, instead of going to one main function to do this and another main function to do that, the solution could remap the user interface so that a person only has to go through one function. The way that function branches off should make a bit more sense."

What other advice do I have?

I have a lot of hands-on experience with the solution and I present it to customers and do all the POCs for them. I'd recommend the solution and advise others to look at cloud options, as most companies are moving to the cloud anyway right now. It's flexible, so users can deploy it both on-prem or on the cloud. There are lots of great custom features and network monitoring capabilities. You can also patch the privileged behavior and it will, on the fly, give you nice digital printouts with privileged behavior also. If your system admin or one of your admins suddenly acts strangely, even at 2…
Get our free report covering WALLIX, CyberArk, One Identity, and other competitors of BeyondTrust Privileged Remote Access. Updated: January 2021.
464,369 professionals have used our research since 2012.