BeyondTrust Privileged Remote Access Overview

BeyondTrust Privileged Remote Access is the #15 ranked solution in our list of top Remote Access tools. It is most often compared to WALLIX Bastion: BeyondTrust Privileged Remote Access vs WALLIX Bastion

What is BeyondTrust Privileged Remote Access?

BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.

Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security.

Features include:

- Privileged Access Control: Enforce least privilege by giving users the right level of access.

- Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections.

- Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway.

- Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials.

- Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere.

- Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.

BeyondTrust Privileged Remote Access is also known as Bomgar Privileged Access.

BeyondTrust Privileged Remote Access Buyer's Guide

Download the BeyondTrust Privileged Remote Access Buyer's Guide including reviews and more. Updated: January 2021

BeyondTrust Privileged Remote Access Customers

Horizon Beverage, Air Liquide, Gateway Bank of Florida

BeyondTrust Privileged Remote Access Video

BeyondTrust Privileged Remote Access Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
reviewer1419198
IAM Senior Solutions Architect at a tech services company with 1,001-5,000 employees
Real User
Feb 13, 2021
A simple, stable, and secure solution that is FIPS compliant and is easy and quick to deploy

What is our primary use case?

I have a hundred different use cases. They're all different because every customer is different. One of the top use cases is where a third-party vendor needs to internally access one of the servers or applications.

Pros and Cons

  • "Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to maintain this compliance. It is very safe. Customers have been using it in the last eight years because of the simplicity of getting it deployed quickly. Most of the people using the solution had been hacked already, so they needed it quickly. As compared to the other solutions in the market, it can be turned on in production very quickly. You don't really need to have a server. It can be deployed very rapidly on VMware or Hyper-V, and you don't need to do an installation. It is a kind of an all-included package that you just deploy in a VM environment. It is basically a VM that is specifically built for a customer. The way the PRA data solutions work is that you need to build them for each customer because of being hard-coded with their SSL certificate, their web page name, and all that."
  • "It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution."

What other advice do I have?

I would rate BeyondTrust Privileged Remote Access a nine out of ten.
BrunoMassoutier
Head of Communications at Stadt Winterthur
Real User
Top 20
Nov 13, 2019
A easy-to-use solution for providing multi-platform remote support

What is our primary use case?

We use this solution to provide remote authentication for a support system that we are providing. We have a data center with many different products that are based on Windows, Linux, and hardware appliances.

Pros and Cons

  • "The most valuable feature is that this solution can be implemented regardless of the operating system."
  • "Changing your password should be simplified, and there should not be a charge for it."

What other advice do I have?

I would rate this solution a nine out of ten.