BeyondTrust Privileged Remote Access Primary Use Case

Sean Rall - PeerSpot reviewer
Lead Developer at a computer software company with 11-50 employees

It is remote support for our customers. We use it to connect to our clients.

We have a lot of external customers who don't have access to their networks. BeyondTrust helps us access our services inside their networks without the setup of that entire process.

Our use case has to be on-premises. We are not allowed to use cloud stuff. So, we need an on-premises solution. If that went away, we would have to find a new vendor. This is very important for us.

It is used 24/7, as we are a 24/7 operation. So, it is used all the time very extensively. We just increased usage of it last week, increasing our licenses and everything on them.

View full review »
SteveJenovai - PeerSpot reviewer
Sr Technical Product Manager (Sr. Consultant at Computronix) at Computronix

Our company provides a software/platform as a service to state and local governments, municipalities, and provinces. Since all of those need to be NIST 800-54 and FedRAMP compliant, we needed a privileged remote access tool to take care of that access piece. BeyondTrust fills that piece for us.

View full review »
Lance Jones - PeerSpot reviewer
Information Technology Operations Manager at a educational organization with 5,001-10,000 employees

The help desk utilizes it for basic end-user support to make sure they can get something installed or just walk through an issue with an end-user. I use it a lot for helping other admins to fix servers.

Our RPA team also uses it. They basically have virtual desktops that have a script running on them constantly to move data from one location to another manually. They get in, and they use it to manage 50 different desktops for that team. So, three team members manage those 50 clients just to make sure that they're processing all the data correctly throughout the day.

We have a cloud solution. The virtual server is in the cloud, and then it installs the client down to all of our desktops. From there, the ones that utilize it install the admin client on their machines.

We have 20 accounts in there that are utilizing the solution, but not all of them are active at the same time. Throughout the day, all 20 of those may go in. They do what they need to do and then drop out of it to free up a license.

View full review »
Buyer's Guide
BeyondTrust Privileged Remote Access
April 2024
Learn what your peers think about BeyondTrust Privileged Remote Access. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,578 professionals have used our research since 2012.
KL
Sr Cyber Security Manager at Honeywell International Inc.

We have two use cases. We have it for the PAM, Privileged Identity (PI), the Vault solution, and Password List. We also have it on the desktop side of the house for our admin accounts.

Our network requires that Privileged Remote Access (PRA) does not require a VPN.

We are extensively using Privileged Identity, but not PRA.

We are one version back from the latest.

View full review »
Aaron Margerum - PeerSpot reviewer
Systems Engineer at NRC

We use it for remote support for our clients. The main reason we use it is that it allows us to elevate our privileges remotely. While we're using it or supporting the users, we can elevate our smart card.

We are currently using the latest available version of Bomgar. In terms of deployment, we like to have solutions like this on-prem, but it is good to know that it is available in the cloud because we are moving a lot towards the cloud. In the future, once this appliance dies out, we might just transition over to a cloud version. It is good to know that we have the flexibility to do that.

View full review »
Chase Cole - PeerSpot reviewer
Sr. Systems Administrator at Rayburn Country Electric Cooperative, Inc.

I am in the energy sector. The solution is primarily used for something called interactive remote access. We have a secure environment where we manage the energy grid. The BeyondTrust PRA solution helps us meet a compliance requirement since we need to establish a protocol break before we start working on the electrical grid. Therefore, we don't have to walk into the room where the stuff is. It can be remotely accessed for us internally for the most part.

Right now, it is in the NERC system, which is the compliance control. This has an electronic access control system that allows us to get to our stuff. It also allows our vendors to possibly get to our stuff.

View full review »
Kazi Ibrahim Khalil - PeerSpot reviewer
Senior Executive (Cyber Security) at SSL

I use the tool in my lab. I am involved in the product's testing phase in my lab, where I am trying to check out the solution.

View full review »
PR
Lead consultant at Aujas cybersecurity

I work for a massive company. They have 6,000-plus servers integrated into the PRA solution. BeyondTrust is a remote solution for administrators and other privileged accounts across the organization. It controls access to critical servers, domain controllers, Active Directory, Exchange, or any client servers they'll be using. Right now, there are about 10 products on the market globally, and BeyondTrust is the market leader. Within BeyondTrust, there are multiple sub-products, including Password Safe, Privileged Remote Access (PRA), and Endpoint Protection. PRA is unique among BeyondTrust products and other solutions.

We use Password Safe to store all the passwords in a vault, indicating when a privileged user attempts to access a privileged account on a server. PRA doesn't provide direct access to the process. Instead, we'll provide PRA access to Password Safe through a connector. In other words, the user doesn't have access to the critical account via Password Safe. 

Whenever a user wants to initiate a session, they will log into Password Safe, which will inject the credentials. PRA limits access to Password Safe itself. Only a Password Safe engineer has access to that solution, and the engineer is responsible for onboarding the servers and end users. The user will initiate the session via PRA, which will retrieve the credentials. In addition to this core feature, it has reporting tools to record sessions, providing a list of clear logs. 

Right now, BeyondTrust is an on-premise solution. We have a cloud version, but we are not using it. Eventually, we plan to move it to the cloud. BeyondTrust is being used extensively in our organization. There are between 100 and 130 concurrent sessions daily. Our server can easily maintain that usage level, so we don't need to add another. 

View full review »
Temitope Popoola - PeerSpot reviewer
Specialist, Server Administration at IHS Towers

Our company has been growing, and we have many audits as well as SOX compliance requirements. We have different SOX requirements, and we wanted to ensure that every activity is monitored. That was the main reason for deploying this solution into the environment.

We are using it like a VPN access for our external users, such as vendors, to allow them to access the resources within the organization. Instead of providing them the regular VPN access, we give them access to the privileged access solution so that we can monitor what they are doing, and we are able to view back the recordings of all the activities they've done.

We have not integrated Privileged Remote Access (PRA) with other solutions at the moment. We also have another solution of BeyondTrust. We have integrated that solution with other solutions, but we haven’t integrated PRA with other solutions. We just use it for remote access and credential injection.

View full review »
Sorin Hrincu - PeerSpot reviewer
PAM SecOps Team Manager at a tech vendor with 5,001-10,000 employees

We are an MSP, and we have customers actively using the solutions and the services. We do the backend administration and implementation, troubleshooting and incident handling, and other things like that.

Our use cases include adding users, adding environments to the system, and general and advanced configurations for users and environments. Those are just the standard regular use cases. Other than those, we handle platform maintenance, and platform restoration and recovery in case of an incident.

We also use PRA to provide access to third-party vendors. It restricts access only to the devices and only to a certain section of that device or environment that the vendor would need to access. It can also limit access in terms of time and time of day. Access can be subject to approval, which adds an additional layer of security, and we can also set in advance the number of days that that vendor will have access through PRA.

View full review »
CJ
Security Analyst at Secland

It is used for remote access for all our partners. We bought it to replace our VPN connection for all our third-party partners and providers.

All our sensitive services are required to be hosted on-premises. That is why we needed something that offered an on-premises solution.

View full review »
PR
Lead consultant at Aujas cybersecurity

It is used for server access. I am using the latest version. Initially, I started with 10.6, and now, I am on the latest version.

It is currently on-premises, and down the line, we will be moving to the cloud. As of now, we have physical appliances for PRA. We do have plans to move the cloud. We've added two more servers at our end, and they will be moved to the cloud. 

View full review »
Anil Kumar 1 - PeerSpot reviewer
PAM Security Consultant at Cybersec Consulting

We use the solution to give the network access to third-party vendors or remote basis employees. It helps us authenticate their credentials directly without a VPN connection.

View full review »
RH
CEO at MICRODYN AG

We primarily use the solution for Privileged Remote Access. The primary use case is to let the suppliers connect in a very, very secure way on privileged endpoints and internal privilege endpoints or internal operators, probably from Azure. They operate something in the Azure cloud, and that's a very secure way to connect to the Azure cloud.

View full review »
ES
It Manager

One of my customers used old, poorly coded legacy applications, so programs required admin privileges to run. They wanted to give users the ability to run the applications without giving them admin rights.

View full review »
AH
Presales manager at a security firm with 11-50 employees

My company uses BeyondTrust Privileged Remote Access for privileged access management to facilitate the management of RDP sessions and the rotation of credentials or passwords.

View full review »
it_user843969 - PeerSpot reviewer
Head of Communications at Stadt Winterthur

We use this solution to provide remote authentication for a support system that we are providing. We have a data center with many different products that are based on Windows, Linux, and hardware appliances.

View full review »
SH
Cybersecurity Architect at a tech vendor with 1-10 employees

The primary use case is for customers who are aware of RDP, remote desktop insecurity, and want to resolve this by deploying BeyondTrust Remote Access. There are so many features built into the system, and both cloud and on-premises deployment are offered. 

View full review »
JL
IAM Senior Solutions Architect at a tech services company with 1,001-5,000 employees

I have a hundred different use cases. They're all different because every customer is different. One of the top use cases is where a third-party vendor needs to internally access one of the servers or applications. 

View full review »
Buyer's Guide
BeyondTrust Privileged Remote Access
April 2024
Learn what your peers think about BeyondTrust Privileged Remote Access. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,578 professionals have used our research since 2012.